0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0xcc) [ 826.806109] audit: type=1400 audit(1537945165.134:10779): avc: denied { map } for pid=32725 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.963757] audit: type=1400 audit(1537945165.194:10780): avc: denied { map } for pid=32729 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x80040000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 827.148037] audit: type=1400 audit(1537945165.314:10781): avc: denied { map } for pid=32725 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 827.332386] XFS (loop5): Invalid superblock magic number 06:59:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x240000, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x102, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) 06:59:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x8004000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:28 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0xcc) 06:59:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xe8, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 828.858816] XFS (loop5): Invalid superblock magic number 06:59:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:29 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0xcc) 06:59:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000180)={0x18, 0x0, 0x2, {0xeef3}}, 0x18) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) 06:59:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7a000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 830.232326] kauditd_printk_skb: 140 callbacks suppressed [ 830.232342] audit: type=1400 audit(1537945169.954:10922): avc: denied { map } for pid=361 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.311564] audit: type=1400 audit(1537945169.984:10923): avc: denied { map } for pid=361 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.381910] audit: type=1400 audit(1537945169.994:10924): avc: denied { map } for pid=361 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.472485] audit: type=1400 audit(1537945170.024:10925): avc: denied { map } for pid=361 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.544574] audit: type=1400 audit(1537945170.044:10926): avc: denied { map } for pid=361 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.671492] audit: type=1400 audit(1537945170.064:10927): avc: denied { map_create } for pid=362 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 830.728260] audit: type=1400 audit(1537945170.094:10928): avc: denied { map } for pid=361 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.795490] audit: type=1400 audit(1537945170.104:10929): avc: denied { map } for pid=361 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 831.155027] audit: type=1400 audit(1537945170.364:10930): avc: denied { map } for pid=366 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:30 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xf000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 831.238810] audit: type=1400 audit(1537945170.374:10931): avc: denied { map } for pid=366 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x40000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:30 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xcc) 06:59:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x6000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:31 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0xcc) [ 832.053794] XFS (loop5): Invalid superblock magic number 06:59:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2c00, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x7a00, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 832.511011] XFS (loop0): Invalid superblock magic number 06:59:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0xaffc94e95e50555) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r0 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1, 0xd2b6, 0xf45, 0x4, 0x0, 0x6a35, 0x4, 0xb, 0x26f5, 0xffff, 0x2, 0x8, 0x8, 0xedad, 0x9b, 0x2a9, 0x8000, 0xffffffffffff4427, 0xffffffffffffff32, 0x0, 0x0, 0x8, 0x0, 0x800, 0x6, 0x43d, 0x0, 0x6, 0x80, 0x6, 0xed2, 0x80000000, 0xc61, 0x400, 0xfffffffffffffff8, 0x1f, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}, 0x1000, 0x5, 0x7, 0x7, 0x101, 0xffff, 0x8}, r1, 0x0, 0xffffffffffffff9c, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) mlockall(0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000004c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r2}}, 0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x3, @empty, 0xfff}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r3, 0xffffffffffff4364, 0x4, 0x2}, 0x10) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) 06:59:32 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x40000000000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x40, 0x13e7, 0x0, 0x0, 0x0, 0xb0, 0x8, 0x8, 0x7, 0xc2e3, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x40, 0x1ed64000, 0x7, 0x3, 0x100000000, 0x9, 0xa7, 0x0, 0x5, 0x6, 0x2, 0xb7a6, 0x6, 0x2, 0x0, 0xfffffffffffffff9, 0x4000000002, 0x7f, 0x4, 0x3, 0x0, 0x8, 0x1, @perf_bp, 0x0, 0x101, 0x7, 0x0, 0x7, 0x4, 0x80}, 0x0, 0x4, 0xffffffffffffffff, 0x2) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000180)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendto$inet6(r0, &(0x7f0000000280)="4305649cc5f064e278606ac5efd11192e9bb0853f6bd7eb48a9d8c75c4eb1bb5257b57d25fe69243a3c840280f24298158751a975a4520e400fbe1277e839950ab6972dae7ff1f6cec28058bba5a48bdd947cf1e4ac4b36613f41629e729bb54a0cd95e25f8261f383bec3af5b5af528d286eae088ecbf506934df5922e4037af11b9a99f84f164c4f6af2276254265acd93326312c2b2d27fac1231381d9483b4c9b3b44918f503dd47db8c69461b3eff2a3a7766155cfc26556f5bbdb161be4b42932e", 0xc4, 0x24008000, &(0x7f00000001c0)={0xa, 0x4e22, 0x5, @ipv4={[], [], @loopback}, 0xfffffffffffffff9}, 0x1c) sendfile(r1, r2, &(0x7f0000000240), 0x8000fffffffe) 06:59:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:33 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0xcc) [ 833.780882] XFS (loop5): Invalid superblock magic number 06:59:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) 06:59:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4e, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:33 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000980)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fee000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000042f000/0x3000)=nil) munlockall() 06:59:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x10, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:34 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0xcc) 06:59:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x300, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) fsetxattr$security_ima(r1, &(0x7f0000000180)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "0e3416d8bb11847a83ca09b488dd"}, 0xf, 0x2) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) [ 835.248587] kauditd_printk_skb: 139 callbacks suppressed [ 835.248603] audit: type=1400 audit(1537945174.974:11071): avc: denied { map } for pid=459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.394662] XFS (loop5): Invalid superblock magic number [ 835.445269] audit: type=1400 audit(1537945175.044:11072): avc: denied { map } for pid=459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x380, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 835.655034] audit: type=1400 audit(1537945175.074:11073): avc: denied { map } for pid=459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x600000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 835.990550] audit: type=1400 audit(1537945175.084:11074): avc: denied { map } for pid=459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:35 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0xcc) 06:59:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x4c00000000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 836.269821] audit: type=1400 audit(1537945175.154:11075): avc: denied { map } for pid=459 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.526001] audit: type=1400 audit(1537945175.234:11076): avc: denied { map } for pid=459 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.880945] audit: type=1400 audit(1537945175.234:11077): avc: denied { prog_load } for pid=460 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 837.114400] audit: type=1400 audit(1537945175.264:11078): avc: denied { prog_load } for pid=460 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 837.137122] audit: type=1400 audit(1537945175.264:11079): avc: denied { map } for pid=459 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 837.291951] audit: type=1400 audit(1537945175.354:11080): avc: denied { map } for pid=459 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x4) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000340)=@sha1={0x1, "b20c02ec574e96492306dd29a98a82e93928a354"}, 0x15, 0x1) 06:59:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x300, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 837.798330] XFS (loop5): Invalid superblock magic number 06:59:37 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xcc) 06:59:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5a65) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000d80)={&(0x7f0000000c40), 0xc, &(0x7f0000000d40)={&(0x7f0000000c80)={0x14}, 0x14}}, 0x0) 06:59:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x400000000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x700, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:39 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0xcc) 06:59:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000003c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$inet_sctp(r2, &(0x7f0000007080)=[{&(0x7f0000000140)=@in6={0xa, 0x0, 0x4, @remote}, 0x1c, &(0x7f0000000540)}], 0x342, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="daf751"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r4, &(0x7f0000001000), 0x1000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x6, "fbf38c65b965"}, &(0x7f0000000440)=0xe) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000480)=@assoc_value={r5, 0x9}, &(0x7f00000004c0)=0x8) read$FUSE(r4, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r4, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) read$FUSE(r6, &(0x7f0000002000), 0x1000) name_to_handle_at(r6, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000180)="b7b4edcd61cf4fd17b52f851308f837ed3864956072305c1d20b7e16b4d6993174715e7eed3d5a8ee94c4b8ec8fd79582f278f", 0x33) [ 839.701201] XFS (loop5): Invalid superblock magic number 06:59:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4800, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:40 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0xcc) [ 840.254683] kauditd_printk_skb: 114 callbacks suppressed [ 840.254700] audit: type=1400 audit(1537945179.984:11195): avc: denied { map } for pid=544 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x3, 0x1, 0x0) getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004070000000185819bc700000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 840.468967] audit: type=1400 audit(1537945180.014:11196): avc: denied { map } for pid=537 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.675290] audit: type=1400 audit(1537945180.024:11197): avc: denied { map } for pid=544 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.919095] audit: type=1400 audit(1537945180.024:11198): avc: denied { map } for pid=543 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x6800000000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 841.133520] audit: type=1400 audit(1537945180.024:11199): avc: denied { map } for pid=537 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) 06:59:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x400000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 841.380628] audit: type=1400 audit(1537945180.114:11200): avc: denied { map } for pid=543 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 841.615035] audit: type=1400 audit(1537945180.124:11201): avc: denied { map } for pid=544 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 841.732875] XFS (loop5): Invalid superblock magic number [ 841.814885] audit: type=1400 audit(1537945180.144:11202): avc: denied { map } for pid=543 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:41 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0xcc) [ 842.020597] audit: type=1400 audit(1537945180.154:11203): avc: denied { map } for pid=537 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x6b6b6b00, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 842.146094] audit: type=1400 audit(1537945180.174:11204): avc: denied { map } for pid=537 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:42 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000580)={0x0, 0x0, 0x1, @thr={&(0x7f0000000400), &(0x7f0000000480)}}, &(0x7f00000005c0)=0x0) timer_settime(r1, 0x0, &(0x7f0000000640)={{}, {0x77359400}}, &(0x7f0000000680)) 06:59:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x48000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) 06:59:42 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0xcc) 06:59:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x65746367, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 843.578464] XFS (loop5): Invalid superblock magic number 06:59:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x11d, 0x200) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000740)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @multicast2}, {0x2, 0x0, @multicast1}, 0x335, 0x8, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2be}) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) r1 = accept4(0xffffffffffffffff, &(0x7f0000000380)=@nfc_llcp, &(0x7f0000000400)=0x80, 0x80800) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000500)={0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, @remote}]}) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r2 = memfd_create(&(0x7f00000006c0)='/dev/adsp#\x00', 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f041c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000800)={0x4, r0, 0x1}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000640), &(0x7f0000000680)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000840)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1, 0x100000001}}, 0x9, 0xf17}, &(0x7f0000000000)=0x88) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000480)={0x0, 'bond0\x00', 0x4}, 0x18) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000600)) nanosleep(&(0x7f00000005c0)={0x0, 0x989680}, 0x0) setpriority(0x0, 0x0, 0xfffffffffff7fff8) 06:59:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x3f000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:44 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0xcc) [ 845.274369] kauditd_printk_skb: 543 callbacks suppressed [ 845.274386] audit: type=1326 audit(1537945184.984:11742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=626 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=55 compat=0 ip=0x457579 code=0x50000 [ 845.276042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 845.279921] audit: type=1326 audit(1537945184.984:11743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=626 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x50000 [ 845.279953] audit: type=1326 audit(1537945184.984:11744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=626 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457579 code=0x50000 [ 845.279983] audit: type=1326 audit(1537945184.984:11745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=626 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457579 code=0x50000 [ 845.280011] audit: type=1326 audit(1537945184.984:11746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=626 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457579 code=0x50000 06:59:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x8000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x4, 0x400000) write$P9_RRENAMEAT(r1, &(0x7f00000002c0)={0x7, 0x4b, 0x1}, 0x7) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x4, {0x7, 0x1b, 0x2, 0x6060, 0x0, 0x8, 0x400, 0x3}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) [ 845.280037] audit: type=1326 audit(1537945184.984:11747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=626 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457579 code=0x50000 [ 845.451855] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 845.460492] audit: backlog limit exceeded 06:59:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xf0ffff, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 845.552321] XFS (loop5): Invalid superblock magic number [ 845.556700] audit: audit_backlog=65 > audit_backlog_limit=64 06:59:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x9003000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:46 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 06:59:46 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0xcc) 06:59:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xad04, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xe8000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 847.167281] XFS (loop5): Invalid superblock magic number [ 847.333832] f2fs_msg: 2 callbacks suppressed [ 847.333848] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 06:59:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x80030000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0xfffffffffffffffa) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f646529cf4479ecde080652e06a5fb33d30303030303030303030303030303030303034", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0xf910, &(0x7f00000002c0)=0x2) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000008200000000000000000000000000006576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b7379737e656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x90) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f00000001c0), 0x0) [ 847.425554] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 06:59:47 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0xcc) [ 847.492197] attempt to access beyond end of device [ 847.528496] loop0: rw=12288, want=8200, limit=20 [ 847.558638] attempt to access beyond end of device [ 847.586657] loop0: rw=12288, want=12296, limit=20 [ 847.615617] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 847.652561] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 847.699180] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 847.746987] attempt to access beyond end of device [ 847.805471] loop0: rw=12288, want=8200, limit=20 06:59:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x1000000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 847.832295] attempt to access beyond end of device [ 847.882440] loop0: rw=12288, want=12296, limit=20 [ 847.925180] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 06:59:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = dup2(r0, r0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000300)) 06:59:48 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xcc) 06:59:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) splice(0xffffffffffffffff, &(0x7f0000000800), r0, &(0x7f0000000840), 0x0, 0x0) [ 848.972476] XFS (loop5): Invalid superblock magic number 06:59:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xad04000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x47030000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x38, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f00000000c0), 0x16d) 06:59:49 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0xcc) 06:59:49 executing program 3: prctl$intptr(0x2000000001d, 0xfffffffffffff322) prctl$getreaper(0x40400000000001e, &(0x7f0000000040)) [ 850.288442] kauditd_printk_skb: 245 callbacks suppressed [ 850.288458] audit: type=1400 audit(1537945190.014:11958): avc: denied { map } for pid=736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 850.437450] audit: type=1400 audit(1537945190.054:11959): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x5000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 850.589335] audit: type=1400 audit(1537945190.064:11960): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 850.774751] XFS (loop5): Invalid superblock magic number [ 850.795581] audit: type=1400 audit(1537945190.084:11961): avc: denied { prog_load } for pid=737 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:59:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x6b6b6b00, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000de2ff4), 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000000301ff07008fbda33d88c000001018bb"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x2ca3bfc89d2264d, 0x0, &(0x7f0000000c40)={0x0, 0x989680}) [ 850.953216] audit: type=1400 audit(1537945190.124:11962): avc: denied { prog_load } for pid=737 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:59:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xf0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:50 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0xcc) [ 851.153565] audit: type=1400 audit(1537945190.154:11963): avc: denied { map } for pid=736 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:51 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x10000) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, &(0x7f00000002c0)=0x7, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b9b, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000003c0), &(0x7f0000000340)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000015340)={&(0x7f0000014d00)=@can, 0x80, &(0x7f0000014e40), 0x0, &(0x7f0000014e80)}, 0x0) pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x97) [ 851.354229] audit: type=1400 audit(1537945190.254:11964): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 851.534228] audit: type=1400 audit(1537945190.274:11965): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 851.704893] audit: type=1400 audit(1537945190.374:11966): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 851.841898] audit: type=1400 audit(1537945190.404:11967): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7a00000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:52 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0xcc) [ 852.382502] XFS (loop5): Invalid superblock magic number 06:59:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xffffffeb, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2900000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000180)={&(0x7f0000000000), 0x1f5, &(0x7f0000000140)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 06:59:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x6c000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./bus\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="e06e934087de6e14de701601a006fb4f15737ad9d0a3e6f8401b4a24ebf5ac338746ca470d89e588f20727c8f06a1a884e2a637bf225b47c043df9d775fff10ac16054a275040b403e79411485c2c563eb2a1ff2b431d10db3484613095044dc1ef231d17434f3"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f00000000c0)='./file0\x00') r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000140)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) 06:59:53 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0xcc) 06:59:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xc0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 853.887083] XFS (loop5): Invalid superblock magic number 06:59:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x480, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:53 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x0) recvfrom$llc(r0, &(0x7f0000000100)=""/63, 0x3f, 0x0, &(0x7f0000000040)={0x1a, 0x317, 0xfffffffffffffff8, 0x1, 0x1fd2, 0x400, @random="dd06796842be"}, 0x10) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x800) 06:59:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x2) ioctl$UI_SET_SWBIT(r1, 0x40085511, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0xa600, 0x20) 06:59:54 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0xcc) 06:59:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x6000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:55 executing program 3: unlink(&(0x7f0000000240)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x1) mq_timedreceive(r0, &(0x7f0000000040)=""/55, 0x37, 0xff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockname$netlink(r1, &(0x7f00000000c0), &(0x7f0000000200)=0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x10003, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KDSETLED(r0, 0x4b32, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40802, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r5}, &(0x7f0000000140)=0x8) r6 = add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)="296f8a13db", 0x5, 0xfffffffffffffffa) r7 = add_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r6, 0x0, 0x0, r7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r4, &(0x7f0000000180), 0x8402) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="f10f6f1254c59632aa84af7e1a85f005dd72c8e250bcea4e84ef5b491c08f38bbc3246ab68ba04211c48a97b4d83607ddd1a5fa44c164307aaf22911c35a69fdd5b20344ebb14b8c672fe36af5292f8aa238149d14cf80802b96b4b439898f5c31a9c26717606c1b238f12512d7671d025c4065b2f5a9c013b79d89b653458b6a79b165d760a342a9d73d94d1cd22e9466c567fbe59cfff108cc736ab4c5c23749"], 0x3) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10000020) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 855.341239] kauditd_printk_skb: 142 callbacks suppressed [ 855.341255] audit: type=1400 audit(1537945195.064:12110): avc: denied { prog_load } for pid=837 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:59:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x48, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 855.547322] audit: type=1400 audit(1537945195.124:12111): avc: denied { prog_load } for pid=837 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 855.624490] XFS (loop5): Invalid superblock magic number [ 855.754263] audit: type=1400 audit(1537945195.394:12112): avc: denied { map } for pid=844 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:55 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x8002, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 855.887142] audit: type=1400 audit(1537945195.394:12113): avc: denied { map } for pid=844 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:55 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0x21, @multicast1, 0x4e21, 0x1, 'dh\x00', 0x1b, 0x5, 0x21}, 0x2c) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x103802) r2 = epoll_create(0x1000005) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) [ 856.127969] audit: type=1400 audit(1537945195.444:12114): avc: denied { map } for pid=844 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:56 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}, 0xcc) [ 856.340052] audit: type=1400 audit(1537945195.464:12115): avc: denied { map } for pid=844 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.537202] audit: type=1400 audit(1537945195.544:12116): avc: denied { map } for pid=844 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4ad, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 856.736223] audit: type=1400 audit(1537945195.624:12117): avc: denied { map } for pid=844 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.943707] audit: audit_backlog=65 > audit_backlog_limit=64 [ 856.994307] audit: type=1400 audit(1537945195.624:12118): avc: denied { map } for pid=844 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:59:56 executing program 3: symlink(&(0x7f0000006e40)='./file1\x00', &(0x7f0000000080)='./file1\x00') r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='^\x00', r0}, 0x10) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x20, 0x100}) fcntl$setlease(r0, 0x400, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000200)={0x2, 0x10001}) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 06:59:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x346, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 857.305700] XFS (loop5): Invalid superblock magic number 06:59:57 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) mount(&(0x7f0000001440), &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) sendmmsg(0xffffffffffffffff, &(0x7f0000001ac0), 0x0, 0x4000) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getpid() r1 = syz_open_dev$sndpcmc(&(0x7f00000013c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40000) getsockopt$inet6_dccp_int(r1, 0x21, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000015c0), &(0x7f0000001700)=0x8) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 06:59:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2900, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:57 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0xcc) 06:59:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x2000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x3, 0x6, 0x1, 0xdec, '\x00', 0x9b4f}) fcntl$setflags(r0, 0x2, 0x1) 06:59:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x2, 0x8}]}, 0xc, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="673ef342ab45dfc7660f38826903670f01c166b823018ee8c4018969f20f20e035080000000f22e066b8fd008ed8440f20c0350d000000440f22c065f00fb3ba97e47ac7", 0x44}], 0x1, 0x0, &(0x7f0000000280), 0x0) 06:59:58 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}, 0xcc) [ 858.785828] XFS (loop5): Invalid superblock magic number 06:59:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 06:59:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xff030000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 06:59:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xfeffffff00000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 06:59:59 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0xcc) 06:59:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x8000, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0xf9, 0x0, [0x6, 0xffffffff, 0x2, 0x401]}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000002000), 0x1068) read$FUSE(r0, &(0x7f0000001000), 0x1000) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)) write$FUSE_INTERRUPT(r0, &(0x7f00000002c0)={0x10, 0x0, 0x1}, 0x10) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2}, 0x78) 06:59:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000bc0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000008c0)) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) accept$inet(r0, &(0x7f0000000a00)={0x2, 0x0, @dev}, &(0x7f0000000a40)=0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x28400, 0x4) mremap(&(0x7f0000a31000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000468000/0x2000)=nil) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000100)=""/219) munlockall() setns(r1, 0x40000000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 860.364207] XFS (loop5): Invalid superblock magic number [ 860.378224] kauditd_printk_skb: 184 callbacks suppressed [ 860.378240] audit: type=1400 audit(1537945200.104:12289): avc: denied { map } for pid=943 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x10000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 860.577788] audit: type=1400 audit(1537945200.104:12290): avc: denied { prog_load } for pid=949 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 860.742802] audit: type=1400 audit(1537945200.104:12291): avc: denied { prog_load } for pid=949 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:00 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0xcc) [ 860.942091] audit: type=1400 audit(1537945200.154:12292): avc: denied { map } for pid=943 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.181453] audit: type=1400 audit(1537945200.244:12293): avc: denied { map } for pid=943 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.513433] audit: type=1400 audit(1537945200.274:12294): avc: denied { map } for pid=943 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:01 executing program 0: unshare(0x8000400) socketpair$inet6(0xa, 0x80000, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x101, 0x10000000000, 0x1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)={r1, 0x78, "088af1bb319c96b34660ba8a00fb0141489f58eca7f9f341c91b28603a75a0be9c149aa59a98b7c22bada98054319dd7cecf389e01ae0ee91c9021080facbaa4b0865dd3d990de0b861cba0f5cff8db673df387be23dcd01efd9911c29bffc4469e8201f097f6617832488a6de40a691dc09e026465b7ab0"}, &(0x7f0000000140)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x84000, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000380)) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0xe}, 0x5a, r2}) r4 = mq_open(&(0x7f00000002c0)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) mq_notify(r4, 0x0) fcntl$setlease(r4, 0x400, 0x0) 07:00:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x4000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 861.886243] audit: type=1400 audit(1537945200.304:12295): avc: denied { map } for pid=959 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.908850] audit: type=1400 audit(1537945200.304:12296): avc: denied { map } for pid=959 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.931130] audit: type=1400 audit(1537945200.344:12297): avc: denied { map } for pid=959 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.955132] audit: type=1400 audit(1537945200.374:12298): avc: denied { map } for pid=959 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 862.270616] XFS (loop5): Invalid superblock magic number 07:00:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7f010000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:02 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}, 0xcc) 07:00:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x34, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:03 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), 0x4) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x5, 0x4) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x2284) 07:00:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xad040000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 864.231662] XFS (loop5): Invalid superblock magic number 07:00:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x4c000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:04 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}, 0xcc) 07:00:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x989680, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:04 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "1bff8038212a7b24e02c7edd4a2c8fda66d103"}, 0x14, 0x1) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b54c007110000f30501000b000200000010d10300cf", 0x1f) 07:00:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4c00, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(r0, r1, 0xfff, 0x4) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000140)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r3) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000f1dff8)={0x0, r3}) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000180)={0x89, 0x2, 0x10001, "847481ca0c5e90f34672e00d0f301904ba1424b99edba86acb4fc09543fcb50281a5c9a431b3681c148a810941897592151eb6d32ebcd1b94b66273a584db6f535e0672905bb15a8bb5cd2570fc294f7648313adca8807db7700f51ec818d4b5052cb8395db8e301f3fe5d6e638ed7b186e0ea508052fa19757aa65e553d308512acc7f6c15e7750f1"}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x50, r4, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffffb}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0xb1748597718a2444) [ 865.387421] kauditd_printk_skb: 140 callbacks suppressed [ 865.387438] audit: type=1400 audit(1537945205.114:12439): avc: denied { map } for pid=1040 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 865.507629] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 07:00:05 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0xcc) [ 865.633004] audit: type=1400 audit(1537945205.184:12440): avc: denied { map_create } for pid=1045 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 865.719025] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 07:00:05 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "1bff8038212a7b24e02c7edd4a2c8fda66d103"}, 0x14, 0x1) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b54c007110000f30501000b000200000010d10300cf", 0x1f) [ 865.808544] audit: type=1400 audit(1537945205.184:12441): avc: denied { create } for pid=1047 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 865.828299] XFS (loop5): Invalid superblock magic number [ 865.865659] audit: type=1400 audit(1537945205.204:12442): avc: denied { map } for pid=1043 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 865.909319] audit: type=1400 audit(1537945205.204:12443): avc: denied { write } for pid=1047 comm="syz-executor0" path="socket:[98254]" dev="sockfs" ino=98254 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 865.942712] audit: type=1400 audit(1537945205.214:12444): avc: denied { map } for pid=1043 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 865.976234] audit: type=1400 audit(1537945205.224:12445): avc: denied { write } for pid=1047 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 07:00:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xff03, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 866.126790] audit: type=1400 audit(1537945205.254:12446): avc: denied { map } for pid=1051 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 866.162329] audit: type=1400 audit(1537945205.274:12447): avc: denied { map } for pid=1051 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.354342] audit: type=1400 audit(1537945205.304:12448): avc: denied { setattr } for pid=1047 comm="syz-executor0" name="NETLINK" dev="sockfs" ino=98254 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 07:00:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x600000000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:06 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0xcc) 07:00:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x1}, 0x24}}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0x40000) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 07:00:06 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "1bff8038212a7b24e02c7edd4a2c8fda66d103"}, 0x14, 0x1) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b54c007110000f30501000b000200000010d10300cf", 0x1f) 07:00:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 867.546316] XFS (loop5): Invalid superblock magic number 07:00:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:07 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0xcc) [ 868.145058] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 07:00:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x6b6b6b, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700)="848432503e1ac2bae9d92144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49f3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02eb796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fee4a929cea900837f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d9add945238acddb8375d4b349d571748902d266efb9ab909b8b6e7", 0xc0, r1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)=0x0) process_vm_readv(r3, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/199, 0xc7}, {&(0x7f0000000380)=""/40, 0x28}, {&(0x7f00000004c0)=""/98, 0x62}, {&(0x7f00000008c0)=""/223, 0xdf}, {&(0x7f00000009c0)=""/213, 0xd5}, {&(0x7f00000003c0)=""/15, 0xf}, {&(0x7f0000000ac0)=""/208, 0xd0}], 0x7, &(0x7f0000002f40)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/167, 0xa7}, {&(0x7f0000001d00)=""/97, 0x61}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f00000005c0)=""/3, 0x3}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/150, 0x96}, {&(0x7f0000002e40)=""/255, 0xff}], 0x8, 0x0) r4 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0), &(0x7f0000000140)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000480)={r0, r2, r4}, &(0x7f0000000640)=""/155, 0x320, &(0x7f0000000600)={&(0x7f0000000580)={'wp256-generic\x00'}, &(0x7f0000000000)}) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x2) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) getpeername$netlink(r5, &(0x7f0000003040), &(0x7f0000003080)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000002fc0)={0x3}, 0x1) connect$inet6(r5, &(0x7f0000003000)={0xa, 0x4e24, 0x9, @mcast2, 0x30e2}, 0x1c) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @rand_addr}}, 0xffffffffffffffe9, 0xffffffffffffffff, 0x0, 0x0, 0x9c}, &(0x7f0000000280)=0x98) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000180)=0x8) ioctl$sock_inet6_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f00000002c0)) 07:00:08 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x8) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0xe1, "1dea55d756608085e3b6bd5ef79a22c73360f298158469825380d8b71b81bb400346815158a4dc270ee7fc856273f7e612739ba9e16a12d9f6d92f8a1c359f74a6c3dbe37f0abb3c349ea6e7bb0ae2c06e465cf3e623df34d4d34b75f42ba59015e301a832408a25e7073014d4bc489512ba9910c4a891a200bfc0f45d36f9b8a95e1245acfff06a5072a9185838210b53ec764af8bfaf1a711c028d7866b767486e0e7fb15995bd39430f74f1d639ecadbf6a3f08f2c72b6ab61bae55196b1e932b4e086fbf8ef1513b170ebe41dab0163d1d151336f8f2ed321c5d34842e9656"}, &(0x7f0000000100)=0xe9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)={r2, 0xf, "b8e77b2c5604a26b2ba0d0abcc9469"}, &(0x7f0000000300)=0x17) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x10200, 0x4) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x3, 0x1) 07:00:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x200000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:09 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0xcc) [ 869.391287] XFS (loop5): Invalid superblock magic number 07:00:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:09 executing program 0: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004aeb5c)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000447ff0), 0x288, &(0x7f00008b2000)}, 0x0) 07:00:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x2, 0x7) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr=0x9}, 0x10) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x0, {0x0, 0x0, 0x7, 0x2, 0xa19a}}) 07:00:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x1000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 870.424072] kauditd_printk_skb: 183 callbacks suppressed [ 870.424088] audit: type=1400 audit(1537945210.144:12632): avc: denied { map } for pid=1160 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x500, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 870.623531] audit: type=1400 audit(1537945210.284:12633): avc: denied { map } for pid=1160 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 870.665841] audit: type=1400 audit(1537945210.314:12634): avc: denied { map_create } for pid=1161 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 870.691824] audit: type=1400 audit(1537945210.344:12635): avc: denied { map_create } for pid=1161 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:10 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0xcc) 07:00:10 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '-vboxnet1-eth0\x00'}, &(0x7f00000003c0), 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x9) io_setup(0x7, &(0x7f0000000640)=0x0) io_getevents(r2, 0x0, 0x4, &(0x7f0000000680)=[{}, {}, {}, {}], &(0x7f0000000700)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, r5) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') read(r1, &(0x7f0000000240)=""/193, 0xc1) fremovexattr(r3, &(0x7f0000000600)=@known='system.posix_acl_default\x00') mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x60) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="08072abd7000fcdbdf2506000000080004000900000048000100080f28000023000014000300ac1414bb0000000000000000000000000c000700040000000400000008000100020000000c0007002800000018000000080009004a00000008000400feffffff"], 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x20004000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) vmsplice(r3, &(0x7f00000005c0)=[{&(0x7f0000000500)="2485ab05a5122e444ba18d0946f2e3b725132fa5cf089a5acd0be2c81e52dd59a1f4981e9424098ee020690803fe23b068ebb46e76e094297c175eb16a551904952ce22e24bc26e1e7da834a46bcf5106f1cea02d80d202e61edb040838f888850520141b0b80c0bc551d4c4e6857c8f37fbc8bb02a4ddedb0432870398b39c811eb04242fbcfb9ca23ca13fc0", 0x8d}], 0x1, 0xb) select(0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000000040), &(0x7f0000000100)) [ 870.881167] audit: type=1400 audit(1537945210.344:12636): avc: denied { map } for pid=1160 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 870.945330] XFS (loop5): Invalid superblock magic number [ 871.107775] audit: type=1400 audit(1537945210.364:12637): avc: denied { map } for pid=1160 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xb8, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 871.284259] audit: type=1400 audit(1537945210.474:12638): avc: denied { map } for pid=1160 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 871.464841] audit: type=1400 audit(1537945210.524:12639): avc: denied { map } for pid=1160 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 871.631442] audit: type=1400 audit(1537945210.594:12640): avc: denied { map } for pid=1168 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 871.818313] audit: type=1400 audit(1537945210.664:12641): avc: denied { map } for pid=1168 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:11 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0xcc) 07:00:12 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "5a2ebc41c5f3d032dad0a64dd7ed659bb01d4c12d8ed1140f8400755b95a38aee55803ca89613d46215e14516ac66335e63d66e449a4da86a317a0cf287a825c9a0b992a36f255adfa88b3fb12b33f5843a70ab2de946510e7747d34750744cebdea98669d0564d2ca65e111f41214cfa1159c0e9fc94a9a672f9b92d869c76b16a27684402d36c971e018baea4c0db771f51679602691a27d25b6f12fdabe044d7c83428fb97171"}, 0xac) mount(&(0x7f0000000180)=@nbd={'ubiv/nbd'}, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ubifs\x00', 0x0, &(0x7f0000000140)='adfs\x00') 07:00:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x600, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x7a, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 872.747378] XFS (loop5): Invalid superblock magic number 07:00:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x8003000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 873.515128] UBIFS error (pid: 1230): cannot open "ubiv/nbd", error -22 [ 873.536840] UBIFS error (pid: 1230): cannot open "ubiv/nbd", error -22 [ 874.288788] XFS (loop5): Invalid superblock magic number 07:00:14 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f00000003c0)='./file1\x00', &(0x7f00000001c0)='./file0\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x6, 0xffffffffffff0001, 0x430, 0x0, 0x2, r2}, 0x2c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x200) write$selinux_create(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="73797374656d5f753a6f626a39a0962c723a6167708bc9872408008365766963655f743a7330202f7573722f7362696e2f6e74706420303030303030302f00"], 0x39) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000440)=0x1) sendto$inet6(r0, &(0x7f0000000400), 0xdd, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x2d868cedc5ca1bcc) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) truncate(&(0x7f0000000480)='./file1\x00', 0xe75c) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000100)=0x1) sendto$inet6(r4, &(0x7f0000000340)="cba01d3331cd4e93512f15a398432cb933c040774ff4f854ae4422a34d34392d99eeaeff968239ca44fdc85b73e9f558bb0183b33174405bcc7abe80eba2ee42e9ab61887d", 0x45, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) 07:00:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0xe000, 0x1, &(0x7f0000000780)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) rt_sigsuspend(&(0x7f00000001c0)={0x7f}, 0x8) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=@ethernet={0x1, @local}, 0x80) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x200000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000380)=0x10) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x1000030, 0x0) truncate(&(0x7f0000000300)='./file0/file0\x00', 0x2) 07:00:14 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0xcc) 07:00:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7a00, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xe101000000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xa, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:14 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xcc) [ 875.436219] kauditd_printk_skb: 181 callbacks suppressed [ 875.436237] audit: type=1400 audit(1537945215.164:12823): avc: denied { map } for pid=1271 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 875.661317] audit: type=1400 audit(1537945215.194:12824): avc: denied { map } for pid=1269 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x100000000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x400000000016, &(0x7f0000000100)) ptrace(0x10, r1) socketpair$inet6(0xa, 0x7, 0xfffffffffffffeff, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0)=0x2, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) [ 875.893897] audit: type=1400 audit(1537945215.204:12825): avc: denied { map } for pid=1270 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 875.924431] XFS (loop5): Invalid superblock magic number [ 876.135314] audit: type=1400 audit(1537945215.214:12826): avc: denied { map } for pid=1271 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a03, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7a, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 876.387141] audit: type=1400 audit(1537945215.224:12827): avc: denied { map } for pid=1269 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 876.609745] audit: type=1400 audit(1537945215.284:12828): avc: denied { map } for pid=1270 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 876.719494] audit: type=1400 audit(1537945215.334:12829): avc: denied { map } for pid=1271 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:16 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)=0x9c) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8001, &(0x7f0000000000), 0x80, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x1000, 0x1) syz_open_dev$mouse(&(0x7f0000001a40)='/dev/input/mouse#\x00', 0x1, 0x101000) r0 = socket$pptp(0x18, 0x1, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000001b80)={0x0, 0x0}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x6, 0x8, 0x2, 0x7, 0x0, 0x7fffffff, 0x4200, 0xa, 0x5, 0x4, 0xfffffffffffffffe, 0x46ae, 0xa2d, 0xade0, 0xfbd7, 0x6, 0x8, 0xa33c, 0x1000000000000, 0xace, 0x1, 0x2, 0x9, 0x40, 0x40, 0x28e3, 0x9, 0x4, 0x1, 0x7fff, 0x4676, 0x95, 0x3, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0xc249, 0xffff}, 0x80, 0xe537, 0xe6fe01ea00, 0x7, 0x7, 0x3, 0x1000}, r1, 0x10, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) setsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000100)=0x200, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000000c0)={0x6}) 07:00:16 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0xcc) [ 876.845486] audit: type=1400 audit(1537945215.374:12830): avc: denied { map } for pid=1270 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.034239] audit: type=1400 audit(1537945215.394:12831): avc: denied { map } for pid=1270 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.279629] audit: type=1400 audit(1537945215.434:12832): avc: denied { map_create } for pid=1272 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x6574636700000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:17 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0xcc) [ 877.775480] XFS (loop5): Invalid superblock magic number 07:00:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xa00000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x3b0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:18 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000080)={0x34, 0x0, 0x3, 0x26b, 0x0, 0x100}) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, 0x12, r2, 0x0) mbind(&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x4003, &(0x7f0000000040)=0x9, 0x7, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 07:00:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}}) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000000)=""/95) lseek(r0, 0x0, 0x1) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg$kcm(r4, &(0x7f0000003540)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000002480)=[{&(0x7f0000000180)=""/59, 0x3b}], 0x1, &(0x7f0000002540)=""/4096, 0x1000}, 0x160) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000280)={{0x9, 0x28c, 0x25df, 0x5, 0x401, 0xfffffffffffffffc}, 0x7fff}) write(r1, &(0x7f0000000400)="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", 0x200) sendfile(r1, r2, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x61, 0x100) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002000), 0xffffffff000) mlockall(0x1) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000240)={'veth0_to_team\x00', {0x2, 0x4e21, @rand_addr=0x6}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x10000) 07:00:18 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0xcc) 07:00:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xe800, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7f01000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 879.865316] XFS (loop5): Invalid superblock magic number 07:00:19 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffffff}, 0x30) ptrace$peekuser(0x3, r2, 0x71a000000000000) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={@mcast2, @remote, @dev={0xfe, 0x80, [], 0x16}, 0x74, 0xc4, 0x8, 0x100, 0x1, 0x310000, r4}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x60, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x4, 'wrr\x00', 0x0, 0x20}, 0x2c) [ 880.534373] kauditd_printk_skb: 157 callbacks suppressed [ 880.534389] audit: type=1400 audit(1537945220.214:12990): avc: denied { map } for pid=1379 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.831748] audit: type=1400 audit(1537945220.244:12991): avc: denied { map } for pid=1379 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:20 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0xcc) 07:00:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x47030000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 881.119734] audit: type=1400 audit(1537945220.344:12992): avc: denied { map } for pid=1379 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.145275] audit: type=1400 audit(1537945220.384:12993): avc: denied { map } for pid=1379 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.169503] audit: type=1400 audit(1537945220.424:12994): avc: denied { map_create } for pid=1380 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 881.192441] audit: type=1400 audit(1537945220.454:12995): avc: denied { map } for pid=1384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.219360] audit: type=1400 audit(1537945220.484:12996): avc: denied { map } for pid=1384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.241743] audit: type=1400 audit(1537945220.504:12997): avc: denied { map } for pid=1379 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.269697] audit: type=1400 audit(1537945220.544:12998): avc: denied { map } for pid=1384 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4253465800000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 881.404297] audit: type=1400 audit(1537945220.544:12999): avc: denied { prog_load } for pid=1383 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x726f757000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:22 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0xcc) [ 882.619480] XFS (loop5): Invalid superblock magic number 07:00:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:22 executing program 0: r0 = socket$nl_xfrm(0x2, 0x6, 0x21) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10d, 0x10, &(0x7f0000000000)=0x1, 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b8000000130000000000000000000000000000000000000000000000000000017f00000100000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x41851, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) 07:00:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x6800, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:22 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0xcc) 07:00:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x500000000000000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 883.973417] XFS (loop5): Invalid superblock magic number 07:00:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="08f30000020000009fd35f01c42260a65bec6d17df2c7d8552b7f7deb33e54b2228e539a8e99ac4476c0921be550f229d027cc492e6d813a3bc56eeea96b7fd3f360a59185b244211f138fee13608bb59da4198c619d30f2aa98e1514ce4754e5f76b1bedfb85f2fe46f97"], 0xfffffffffffffffd) [ 885.566040] kauditd_printk_skb: 199 callbacks suppressed [ 885.566057] audit: type=1400 audit(1537945225.294:13199): avc: denied { map } for pid=1473 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:25 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000180)={0x7, 0x6d, 0x2}, 0x7) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000002d, 0x0) 07:00:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x5, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:25 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xcc) 07:00:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xf6ffffff, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 885.636127] audit: type=1400 audit(1537945225.324:13200): avc: denied { map } for pid=1473 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.737617] audit: type=1400 audit(1537945225.334:13201): avc: denied { map } for pid=1473 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.870299] audit: type=1400 audit(1537945225.334:13202): avc: denied { map } for pid=1473 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xffffffff00000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:25 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0xcc) [ 885.995597] audit: type=1400 audit(1537945225.354:13203): avc: denied { map } for pid=1473 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 886.213135] XFS (loop5): Invalid superblock magic number [ 886.228276] audit: type=1400 audit(1537945225.404:13204): avc: denied { map } for pid=1473 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x8003, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 886.435516] audit: type=1400 audit(1537945225.404:13205): avc: denied { map } for pid=1473 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 886.619971] audit: type=1400 audit(1537945225.494:13206): avc: denied { map } for pid=1473 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:26 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x3, 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x1}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r2, 0x5, 0xfffffffffffffff9, 0x8}, 0x10) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000003c0)="4c0000001300ff09fffd956fa283b70000e94600000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) [ 886.786062] audit: type=1400 audit(1537945225.504:13207): avc: denied { map } for pid=1473 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0xe1010000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = socket$packet(0x11, 0x3fffffffffffffff, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 886.949754] audit: type=1400 audit(1537945225.564:13208): avc: denied { prog_load } for pid=1475 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:26 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0xcc) 07:00:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x300000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 887.896939] XFS (loop5): Invalid superblock magic number 07:00:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4c00000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:28 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0xcc) 07:00:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x400201) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) ioprio_set$pid(0x1, 0x0, 0x2000) 07:00:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) munlockall() setsockopt$inet_mreqsrc(r0, 0x0, 0x1000027, &(0x7f0000000480)={@multicast2, @multicast2, @remote}, 0xfffffffffffffda5) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x948, 0x5, &(0x7f0000000400)=[{&(0x7f0000000180)="4c4aeef5885210c91828f7aaa3dddc02c191a11d6e62a60a4edf5c68deaa572c684b36796aa8fef3e1a2b533369372bb216a7a746fad7d469f690a00f6402f47360f9b0f8fb9f3e7330c3123d3d0d0e5d0e6", 0x52}, {&(0x7f0000000200)="9da0f8bdc6550f274ec54fbe28d6f80b168469fc764ae97feaeda0fe6936df417d39ee80e8117843983241f942e7c526", 0x30, 0x80000002}, {&(0x7f0000000240)="1c9d0472497881a255831591223ca576daf3e5c0fc365f44250f9fef59aee8e3d9990af5d23175b9e0a19dc4b97423a98edf7f27f3e36460bbac97fa0c3b362208b2434164469a9d0fd495025efcf2f35c0d50f3876cc05f4a3debc544dab4add5c5a09a51407c24559ea07eab569ee7ffaaad64ea767302ae297dbe70958ef5bb15abd5a19a634ea23e3f8b3a3864a0722ac30f427260fe", 0x98, 0xff}, {&(0x7f0000000300)="be4248480fd3c5803eb801ec332519428a98231ecbe94322c18fdf74c682c45b59901bce86d8ae2d8e13fae591a2d8af675ffd865a975bd2f1fa5915474cb6388ab06496f6bfb6e9e36ac199aa8fdad75bb7dd95b364933530cc3327662b652685db87db940a9cacbed19842fba8c0c0e9e732dfcab3bc68c371bffca20f99d77f856a7341577e57b5feb350e5648588f2256b9302242052c2f3eaa82e", 0x9d, 0x80000000}, {&(0x7f00000003c0)="48d0538ceaa1cafa8df62adffd9877cc73cc", 0x12, 0x80000001}], 0x481, &(0x7f0000000540)={[{@nospace_cache='nospace_cache'}, {@flushoncommit='flushoncommit'}, {@space_cache_v2='space_cache=v2'}, {@enospc_debug='enospc_debug'}, {@nossd_spread='nossd_spread'}, {@skip_balance='skip_balance'}, {@device={'device', 0x3d, './file0'}}, {@device={'device', 0x3d, './file0'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'lo\x00@\x00'}}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@remote, @multicast2, 0x1}, 0x10) 07:00:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xf6ffffff00000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x6c00000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:29 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0xcc) [ 889.551127] XFS (loop5): Invalid superblock magic number 07:00:29 executing program 0: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x102102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fcntl$lock(r0, 0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x9}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x16, &(0x7f0000000040)="1dd74e327620d789a57906b5bb2465cc9b987c46570a265d899593015535aa10a9d3dadcd91aca82922b93b53d5a59dcfe06d055e339", 0x36) 07:00:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) munlockall() setsockopt$inet_mreqsrc(r0, 0x0, 0x1000027, &(0x7f0000000480)={@multicast2, @multicast2, @remote}, 0xfffffffffffffda5) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x948, 0x5, &(0x7f0000000400)=[{&(0x7f0000000180)="4c4aeef5885210c91828f7aaa3dddc02c191a11d6e62a60a4edf5c68deaa572c684b36796aa8fef3e1a2b533369372bb216a7a746fad7d469f690a00f6402f47360f9b0f8fb9f3e7330c3123d3d0d0e5d0e6", 0x52}, {&(0x7f0000000200)="9da0f8bdc6550f274ec54fbe28d6f80b168469fc764ae97feaeda0fe6936df417d39ee80e8117843983241f942e7c526", 0x30, 0x80000002}, {&(0x7f0000000240)="1c9d0472497881a255831591223ca576daf3e5c0fc365f44250f9fef59aee8e3d9990af5d23175b9e0a19dc4b97423a98edf7f27f3e36460bbac97fa0c3b362208b2434164469a9d0fd495025efcf2f35c0d50f3876cc05f4a3debc544dab4add5c5a09a51407c24559ea07eab569ee7ffaaad64ea767302ae297dbe70958ef5bb15abd5a19a634ea23e3f8b3a3864a0722ac30f427260fe", 0x98, 0xff}, {&(0x7f0000000300)="be4248480fd3c5803eb801ec332519428a98231ecbe94322c18fdf74c682c45b59901bce86d8ae2d8e13fae591a2d8af675ffd865a975bd2f1fa5915474cb6388ab06496f6bfb6e9e36ac199aa8fdad75bb7dd95b364933530cc3327662b652685db87db940a9cacbed19842fba8c0c0e9e732dfcab3bc68c371bffca20f99d77f856a7341577e57b5feb350e5648588f2256b9302242052c2f3eaa82e", 0x9d, 0x80000000}, {&(0x7f00000003c0)="48d0538ceaa1cafa8df62adffd9877cc73cc", 0x12, 0x80000001}], 0x481, &(0x7f0000000540)={[{@nospace_cache='nospace_cache'}, {@flushoncommit='flushoncommit'}, {@space_cache_v2='space_cache=v2'}, {@enospc_debug='enospc_debug'}, {@nossd_spread='nossd_spread'}, {@skip_balance='skip_balance'}, {@device={'device', 0x3d, './file0'}}, {@device={'device', 0x3d, './file0'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'lo\x00@\x00'}}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@remote, @multicast2, 0x1}, 0x10) [ 890.579689] kauditd_printk_skb: 182 callbacks suppressed [ 890.579705] audit: type=1400 audit(1537945230.304:13391): avc: denied { map } for pid=1593 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7f01, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:30 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0xcc) [ 890.924285] audit: type=1400 audit(1537945230.314:13392): avc: denied { map } for pid=1591 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe800000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 891.121794] audit: type=1400 audit(1537945230.324:13393): avc: denied { map } for pid=1595 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 891.341767] audit: type=1400 audit(1537945230.334:13394): avc: denied { map } for pid=1588 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 891.547702] audit: type=1400 audit(1537945230.344:13395): avc: denied { prog_load } for pid=1582 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 891.720333] audit: type=1400 audit(1537945230.354:13396): avc: denied { map } for pid=1591 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 891.824343] XFS (loop5): Invalid superblock magic number [ 891.853534] audit: type=1400 audit(1537945230.364:13397): avc: denied { map } for pid=1580 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x3dc, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 892.033917] audit: type=1400 audit(1537945230.364:13398): avc: denied { map } for pid=1583 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 892.094267] audit: audit_backlog=65 > audit_backlog_limit=64 [ 892.097478] audit: audit_backlog=65 > audit_backlog_limit=64 07:00:31 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0xcc) 07:00:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4c, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9c3, 0x0, 0x6}, 0x14) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x2000, @loopback}, 0x1c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001380)='/dev/mixer\x00', 0x400002, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x29) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f00000013c0)={0xb4b, 0x5e4}) 07:00:32 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0xcc) 07:00:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xc000000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 893.473036] XFS (loop5): Invalid superblock magic number 07:00:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000c265, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x0, 0x8000000000000000, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x80}) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x0, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x0, 0x9]}) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={"627230c054594a5f04fc390000000100", 0x1800}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') r2 = getpgid(0xffffffffffffffff) fcntl$setown(r0, 0x8, r2) ioctl$RTC_WIE_ON(r0, 0x700f) r3 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000005c0)="348e341634b60f09cb2d1af950be245ee1f923990ad5535392fbc70796ec", 0x1e, 0xfffffffffffffff9) r4 = request_key(&(0x7f0000000600)='rxrpc\x00', &(0x7f0000000640), &(0x7f0000000680)='/]\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180)='},\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, r3, r4) 07:00:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x68, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:34 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0xcc) 07:00:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe800000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6b6b6b) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:35 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0xcc) 07:00:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x17f, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 895.595623] kauditd_printk_skb: 261 callbacks suppressed [ 895.595639] audit: type=1400 audit(1537945235.324:13626): avc: denied { map } for pid=1679 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 895.768792] XFS (loop5): Invalid superblock magic number [ 895.823667] audit: type=1400 audit(1537945235.334:13627): avc: denied { map } for pid=1679 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xc57199c255000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 895.953488] audit: type=1400 audit(1537945235.444:13628): avc: denied { map } for pid=1679 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 896.141793] audit: type=1400 audit(1537945235.474:13629): avc: denied { map } for pid=1679 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) accept4$packet(r1, &(0x7f0000000000), &(0x7f0000000100)=0x14, 0x800) [ 896.424269] audit: type=1400 audit(1537945235.504:13630): avc: denied { map } for pid=1695 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 896.586428] bridge0: port 2(bridge_slave_1) entered disabled state [ 896.593073] bridge0: port 1(bridge_slave_0) entered disabled state 07:00:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe1010000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 896.660102] audit: type=1400 audit(1537945235.514:13631): avc: denied { map } for pid=1695 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 896.865290] audit: type=1400 audit(1537945235.524:13632): avc: denied { map } for pid=1695 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 896.991247] audit: audit_backlog=65 > audit_backlog_limit=64 [ 896.995482] audit: audit_backlog=65 > audit_backlog_limit=64 [ 897.039937] audit: audit_backlog=65 > audit_backlog_limit=64 07:00:36 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0xcc) [ 897.634528] XFS (loop5): Invalid superblock magic number 07:00:38 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000180)={[0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x6], 0x0, 0x8000}) 07:00:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x500000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:38 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f0000182000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000be000/0x2000)=nil) close(r0) 07:00:38 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0xcc) 07:00:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x3f00000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4c000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 07:00:39 executing program 0: pipe(&(0x7f0000010380)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001180)=[{&(0x7f0000000180)="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", 0x1000}], 0x1) 07:00:39 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}, 0xcc) [ 899.893713] XFS (loop5): Invalid superblock magic number 07:00:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xff000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 900.639849] kauditd_printk_skb: 222 callbacks suppressed [ 900.639865] audit: type=1400 audit(1537945240.364:13831): avc: denied { map } for pid=1783 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") 07:00:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x4e4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x40, &(0x7f00000065c0)={0x0, r3+30000000}) socket$bt_bnep(0x1f, 0x3, 0x4) 07:00:40 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0xcc) [ 900.852620] audit: type=1400 audit(1537945240.454:13832): avc: denied { map } for pid=1783 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 901.006799] audit: type=1400 audit(1537945240.454:13833): avc: denied { map_create } for pid=1787 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 901.231575] audit: type=1400 audit(1537945240.464:13834): avc: denied { map } for pid=1783 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 901.470695] audit: type=1400 audit(1537945240.514:13835): avc: denied { map } for pid=1783 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe101000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 901.734346] audit: type=1400 audit(1537945240.524:13836): avc: denied { map } for pid=1792 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x500, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 901.871660] XFS (loop5): Invalid superblock magic number [ 901.933272] audit: type=1400 audit(1537945240.524:13837): avc: denied { map } for pid=1792 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 902.111749] audit: type=1400 audit(1537945240.614:13838): avc: denied { map } for pid=1783 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x29000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 902.342264] audit: type=1400 audit(1537945240.624:13839): avc: denied { map } for pid=1792 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:42 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0xcc) 07:00:42 executing program 3: socket(0xa, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) ptrace$getsig(0x4202, r2, 0x0, &(0x7f0000000480)) r3 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000640)={0x0, 0x68, "e6b4d34579896ef1f86541835884fd01d1f132d32b3d44cb453089eff2c3710930605ab95296f6cd1d154ae966e18562607bf996d17cfbc019d28724d73c9a95d2d6f3c4c7ea234635dfc1e177e3bf3104a93cd40d813fc1afbb4c98eac5933b3069ac551ebf3f9b"}, &(0x7f0000000180)=0x70) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000240)) setsockopt$inet6_tcp_buf(r3, 0x6, 0x1f, &(0x7f00000006c0)="f8351ce2260e50671ee123d676f2f0b93282d71055fd65942d3e254c25b725785fb5be6615daed28f772446e4cf0de7efbfb1136858a6fa84cbff95b118124b8b3410516ea35984a3c46ccb4c8098da8ce669787d0ef59f47ba8b66dbe978fed3ad87bebcd21405e2a2796fb131064802a0bec3d9d489508807968f764943beb714d720c7b22e93ead0c0b3437fd96fd849a284f650ee0cc72805b0c38a658b6a9c72b975da13720f433ba80f5fe3a05284a7d9794499995e206f025a459b90e28511f4ef035afada8ef1a4abc24fababf964e023241ab2ca882c8a563fb056cc2d84916d31c6802d4b5e4b41f082e99c6cde37b22e4200bdbc2146b6b2b2b7e185e95882824bd294e4e4b796850c5711eca796428b086ffd421c05b7b20af931f1d0b06de0232ac35bbbafa7fed93dfbcf97015e33c773ba03ce755f78daaa71752ea0037fa1a9ea5d0f3f19f7fe114ac1ccc6cb2c3e30e9944340aabc3459005e7f060e7d2469d55c40f867be76abb0c97bb56ae4151527d8aae33ff14b70d1ec6f5c21f886403dc8bc35d31983e6e6f6ed54f1054f2ca373e4d39e4c020acca285b20489b71fc6e54783eed16f9448bd9d0a7ffe1360a48d675351617fbeb59114d5912ade77e8000fd7506fdbdf6c735120fbe7151f785b01109c9b48a575569d04e8c9649cd0f1790fc80246228b2e74ad3f627e0d1402cbf4834e444aed6451624c44fc727610e612f2ea179eae13e1a368fedca717ade82be617960f2cf9285b91faa920543bd4482cb02ff8fa4d71377ea55496645740075bea0a326eb44d8ae148e57722dae1e8b18d3058b59a438867b0245005e9e5af444fd39d949c8fff37b022a02efbd1aabfd9c7c7713ddf8465d4d6773dc7a11353ea15fca71cafed0319b6a48c5c2f9fa23de92b2082ffc7a4d8e30b1c2d6e7d4de5650f2af7484bf85a89e2e1003f216437268ee1261af2c10a18feda425c237d57d04341c06c49ec8403f6032ded189457b9825f6454eeba1a8b667f7e8f8610a42e92f433a418e32a7b0ff0491e548075fb20ff17db9365c6c62bc4d6a24c8a3d8db0cf0dd7fa8742e47d504faadb4466fe96df954ddaa6d5de5aa2d52340589e8b0a23c018c0a6b3e9a726195283ee35b3420881d94b8fbcad63b880b63a87ed06ec167eeede79352571d1b2929207eed396af3cec0fb9234993235411a89b643511deaee2d61ab382c934eaa18c344096e58a3c22d27a40102ff23b01896ccac2f9b951ee4d74990fa9c2f96759023d1801cc3e2e0e20ca8d70a85ac17f188ce86aa05f3303475672dd582b6c88654bf6afc0e7ce1368369b63872450e9ed989036ed603c297ff563fe5b1b4ac3d1e403910ccd85d73df1a92bdebe011d19efd88b6ebec086e7306ac93f3ba4629f948b0589d188a52e22471e73e51cbc909270b7c374d9e01d1ce69d110c5a912df9d1c66e5c1857e89ab398fab7a30c3cc425a437f47adf05755dc65ab2ac83b0347df77d74e104a7cbd362022729ef1f36eb3898a596c214e4598e6521807e3cde0f921a9b2c1e30e7323984adb725e05c29c0fb009f3854a5a5bfb419771492b302e335b0524bc4e75a9a671d068793ca5fc3dea297c4cd2360646bc6833e498cb3cd473a896ce2c92f63f112f0c3430c7f76c619b90f470631b04b8a3372fc58e5adf4e3e7aab36ba678c74ddaa0c838d99b3c40d705c39ad6ba5f68cf10b3a5501164ccf491fe566ca1c60c3e9eadf7d0aaadbcaa88e0e4963587fe5db35b031af90e6e86655fda4b86e69da8f257f4a3a60cd22d80ffb815282eb30680f3c71151ddee779aea361bb0df6d2fd7e8fe3d1396daa5f4ebec90b6b6e7d04753e64675089ce334f980ebdd34ea38cd27ded7623b219dc43f22dbd3ab108bba551a57da5074390c88eb101e55076e1abbba8ede9ff285a361255482892f890b8cdef3096638db361e22f05884e759cfa32dbd26a34e81090fbe9e70b3b9a0f4bd571c5845b7fe17716a9728e511f10b1b4078da4c3608f2a2184b012693a508a216a31eb3b219623290a965046d22dee7316ac44ce7b9f25e3624eb6368ca0ee16f2e53c76f135145d3cac8e560f23bdb86af1963530a692b0df03f9b2d5530dbc5f99cd8dbbadb537e654e80496d6640336dbb583161cdcbc2a793a253260e4e4e94748ddae585c78b1bac5c8f9cf41983fe0ec20a07f7804e3476dc1a2101bbfc8f39d11cb1d3f685186f74c804ea273c61b533d913ca75544a1b08e94cd861a2e46143c3c6bbe686414fb8c7dd2c4cc5c21b5f2a5456297f78212abf988c148d80fd3aa84a7e4e14be4f4a3c2bb5cfb2732afde117d0bb6bf94b0b316b0a0421153a9b845338c4d31090a7ed98c02b988fb4fdec7a030bdae8fc4a75903de92ae28365684449d9e451cfaeedb98554dbe7ae2f42ea6e17e8406d7e7b71c581ea14a084af338ee9a8d09bf879e06dd93122fd065f23d074b648269f689f3bc88f43f643ecbfed225a71f1429be0984d4b4ccfa691db01e1952eb0d8c3cc69cf25d152af3fdc2539724b6ed18cf3ee4717e9d0b564d0b920ae357b052b9050a9799562cbb6ac064deceffa730ab8def98c973cf68ba592c89cba906dd28b5ffd42257023ca3e7394b0db30a8a1eb94dd0558e1336154b663fbbe7002cf48c0e36e279009d6c54e9c3530479e5a87818a419117d7e0ad266adedb75371a838fac16278bb7d116016197393e3543fe82e8db83505c3958825b90a6cbb13397fdda7372e02926f902ee2be94e03b8904bf867f97275fb1bb56f3e66daff27e9466447d54de6fa88f8910830d554d84b24e34f10b7ef05a8333d78298455a96eadb4e59978b50476a54b1bdf3d489073aa8c3169802c5cef51f56d5ba894e79492aef069f071b0040d928b0a331e0b92a39b39ea2e4a69222a5b6e5dbed7ab8be55d656ba13fd8c6169cfb672adbf7576bd7588308b5c61fd7044e2c8b27c84b8494f3297008b15709112ddb3ae9db48cb835afd7da195980a463c448d83ceb029e36179e6bc28f71c418fa80aff9fb36254d16cf9aa01de558cd0bc0c51cf5c337e198b723489c4a3ab734e503d3c04babc1dcb6b54db9b8b65bba24217721c5035cd3cc72412e53f18ace05f938e5fe4c39c9ed20a8d8d1272564d03fd9c44a4c97965342ac06959ca1d8db1171aedb8f8e772c32efedb44648a533c16bfd24f45f879ac4c323e6d165e08d161fe698a46449a87652f078270340829b2d8ce5cc56ec4cef87096c936472d0a865e7cf96e969e89435c2e1bf5e2f878be9fc1249dafda7ecd7de81bd33bfa5628b80955267062720053b94accd52206936b331ffb1b4ed6f575b33221763f6f17186098dfd1b2d001e3b3389e4fdea40ea63507f164bd9cad8dbac17c81ab260a87bd0741cd423f4b8cd217ba870aad268ff05cdbfa3438a046182c427cdb2f170a9e55c01556720dda1c8d306613ac22b88bf1fce19dff35934f303c40ec5af40306e9659eae702878d9593ad71ce32eec5f3352fb3c98a8dfcc1957a2adeb5e852ddef66a913d14d7e6c438a592b4cb9aaa99df20633aa435004cdbadb888800542cb2ad958c5e594c49a0dcd29ca0509ec440db924c3be5e31f5ae69820bd24324b6c4cee14aba04260607ad221c227f94d14133d47583cc54bf1426b84d4109c4a463ae67c97465a125840cb04fff9765ce4abff91776870904569c026aa70715bf4154ab7b23d4d7b8af7d1ed456bbab1f9949c2249005f145c39872fcaf9159d031eb82f7f5dfb8063fca4072d1967d0a7cbd7e721811a36f1321a1d6a48dfbc7a56ef2f9fec02d2c6a6ef7f2f7629f3348f9856f3364d33dbb1b90fd876b841f4cea6f3f84cdad957c80ce7029a43cea5aef756a992f951ad8d2d20c82d24ea414bfe4e69a872558ea03bf0fbabac8abe871ecd5b6d98b924776f5cfe0c04566b7aa9bc8064fc065f88defd00a9c65888867a07ce8cac3ed36ee2ccd5854feafd09c9b3f414b60a45bfb7d7fa826f7fe3029f30c0b236de023856e493710389db8b40703646f00b9397762defd23591aaced5aa3fba2d2c7839cde223e6921ac12e5475e468e1989485ec5b5436563db2e162393ebcaae1e0fcc77a522d3a519a627c30580be11e728bc11319c60c5e7701c5a5065edeb9b422a10793adafb938adf2f8ed5d15c704435384541d79de6e2f435e87fb1f24e92a9ce1f1b580b6f04fbc99742e69d717d99cfafa3cc738573fa871ccd3f9f1a1717a6d907e6bb7eb7ad1ec0f77b374fa1d380088c733f2aae58e8853cb2a367c5b532d60a590098b14ef3eaafd366cbf85b2318887cb232584599d16b557ffca6e4e8d3e30185db1736d7d8f5b2240eb443d14ba9a798419b1d25441f0d54b85709e6cc04c5f5fe68d15707e3f1e79695b64a29d3e1ba07ce2bfeab3864abec56f20fe2d44fee73e3f5b33038c03cd084ad56e33c2aad2f6547a905ac8883c7e2ca5a9808782c289a0f50eda801c0a5cb31e8aa24c7b4e64d7a9d56d1d56d361de109524b51153985e7d5ceb617137f97f27a100090a9364373f69605ded5a31c56afdf4c5786ef4b8e6f59cd477aa1bbb17e24cab66794a8d72059ad443c6119f0967f310d9ca56106e28cfc7545ced4678a787f74f1282c261f36d29aea5a7153ba2486884ae4899142e74559df0dc6cdb82a48a98c498246ae374f830111d79958aa841c8c0f2cb7851e9f08eaec7d756502881ffbe0ba8c9170f88adcfce19640641df85bad018003cfcb34664ecc06099186cd71ee7045a70de16f843f1d8b763afa294861a269f404eb08da947a46c20a8f49c866eb94629c0b0cbd63cea16abf482aca8dbc0076fa411d2cefc35049f2cf00665c528d1b5c0", 0xd90) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffbffffc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) [ 902.658270] audit: type=1400 audit(1537945240.644:13840): avc: denied { map } for pid=1792 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:42 executing program 0: r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 07:00:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x8004, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:43 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0xcc) [ 903.944387] XFS (loop5): Invalid superblock magic number 07:00:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x346) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:43 executing program 3: clock_gettime(0x0, &(0x7f0000000400)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x80000, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000480)={0x7, 0x9, 0x8, 0xffffffffffffffff, 0x4, 0x7ff, 0x81, 0x9, 0x8, 0xb4}) write$evdev(0xffffffffffffffff, &(0x7f00000008c0), 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380), &(0x7f0000000800), 0x0, 0xfffffffffffffffe) r4 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x1ff, 0x0, 0x2, 0x5, 0x0, 0x1, 0x0, 0x8, 0x3, 0x0, 0x0, 0x5, 0x4fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xa884, 0x2f03b3fb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000000000006, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}, 0x14, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r5 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x100000000) pwritev(r5, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000540)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000004c0)=0x80000) r6 = dup2(r5, r5) write$P9_RSTATFS(r5, &(0x7f0000000900)={0x43, 0x9, 0x2, {0x1, 0x9, 0x3f, 0x3, 0x5, 0x8, 0xfffffffffffffffe, 0x1, 0xfffffffffffffffc}}, 0x43) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000440)={'veth1\x00', 0x5}) sendfile(r4, r6, &(0x7f0000000240)=0x1400000000000b00, 0x20000102000007) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000600)=""/247) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) signalfd4(r2, &(0x7f00000003c0), 0x8, 0x0) add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000500), &(0x7f0000000700)="0c86d311c3f588d9bc570619752e67475d42b48c08c0ef4363ee2cd6736c9cf04d1563d1d145e2af8ef4b84c2540fb5a76001d5da610d74c28a8825f4ba730c74e97756f160f4e4c729873f1f994571f9cff67b74f4d0fc9195393d4da099995ca5e1034e561539605ef3119c1", 0x6d, r3) 07:00:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xa8000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') sendfile(r1, r2, &(0x7f0000000000), 0x100000000044) 07:00:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xa00, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:44 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0xcc) 07:00:45 executing program 3: clock_gettime(0x0, &(0x7f0000000400)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x80000, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000480)={0x7, 0x9, 0x8, 0xffffffffffffffff, 0x4, 0x7ff, 0x81, 0x9, 0x8, 0xb4}) write$evdev(0xffffffffffffffff, &(0x7f00000008c0), 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380), &(0x7f0000000800), 0x0, 0xfffffffffffffffe) r4 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x1ff, 0x0, 0x2, 0x5, 0x0, 0x1, 0x0, 0x8, 0x3, 0x0, 0x0, 0x5, 0x4fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xa884, 0x2f03b3fb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000000000006, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}, 0x14, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r5 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x100000000) pwritev(r5, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000540)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f00000004c0)=0x80000) r6 = dup2(r5, r5) write$P9_RSTATFS(r5, &(0x7f0000000900)={0x43, 0x9, 0x2, {0x1, 0x9, 0x3f, 0x3, 0x5, 0x8, 0xfffffffffffffffe, 0x1, 0xfffffffffffffffc}}, 0x43) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000440)={'veth1\x00', 0x5}) sendfile(r4, r6, &(0x7f0000000240)=0x1400000000000b00, 0x20000102000007) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000600)=""/247) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) signalfd4(r2, &(0x7f00000003c0), 0x8, 0x0) add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000500), &(0x7f0000000700)="0c86d311c3f588d9bc570619752e67475d42b48c08c0ef4363ee2cd6736c9cf04d1563d1d145e2af8ef4b84c2540fb5a76001d5da610d74c28a8825f4ba730c74e97756f160f4e4c729873f1f994571f9cff67b74f4d0fc9195393d4da099995ca5e1034e561539605ef3119c1", 0x6d, r3) 07:00:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2001, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000080)={0x7}, 0x278f) [ 905.628579] XFS (loop5): Invalid superblock magic number [ 905.668405] kauditd_printk_skb: 155 callbacks suppressed [ 905.668422] audit: type=1400 audit(1537945245.394:13996): avc: denied { map } for pid=1877 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6800000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 905.871343] audit: type=1400 audit(1537945245.424:13997): avc: denied { map } for pid=1879 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a00, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 906.084266] audit: type=1400 audit(1537945245.424:13998): avc: denied { map } for pid=1878 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 906.262491] audit: type=1400 audit(1537945245.514:13999): avc: denied { map } for pid=1878 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 906.406207] audit: type=1400 audit(1537945245.514:14000): avc: denied { map } for pid=1879 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:46 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0xcc) [ 906.609785] audit: type=1400 audit(1537945245.524:14001): avc: denied { map } for pid=1877 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 906.819991] audit: type=1400 audit(1537945245.544:14002): avc: denied { map } for pid=1879 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:46 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x5) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 907.064790] audit: type=1400 audit(1537945245.544:14003): avc: denied { map } for pid=1878 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0)=0x2, 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x4c6, 0x80000) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000500)) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000540)={0x100, 0x4, 0x1, 0xa0, 0x4ef3, 0x81, 0x6, 0x3, 0x0}, &(0x7f0000000580)=0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000005c0)={r3, 0xfffffffffffffffb, 0x116, 0x5, 0x1f, 0x1}, &(0x7f0000000600)=0x14) sendto$inet(r1, &(0x7f0000000000)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000680), 0x4) [ 907.278172] audit: type=1400 audit(1537945245.604:14004): avc: denied { map } for pid=1877 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.429203] audit: type=1400 audit(1537945245.604:14005): avc: denied { map } for pid=1877 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.541876] XFS (loop5): Invalid superblock magic number 07:00:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xff03000000000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:47 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xcc) 07:00:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4c00000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:47 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x5) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:00:48 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x7, 0x4) r1 = socket(0x200000000010, 0x2, 0x0) write(r1, &(0x7f0000000080)="24000000260077000000000000007701000000ff0100000000000000dcffffff0100ff10", 0x24) 07:00:48 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0xcc) 07:00:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4c000000, 0x0, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 909.188021] XFS (loop5): Invalid superblock magic number 07:00:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe8000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:49 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x5) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:00:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/3}, 0x18) 07:00:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x1000000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:49 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0xcc) [ 910.708693] kauditd_printk_skb: 163 callbacks suppressed [ 910.708723] audit: type=1400 audit(1537945250.434:14169): avc: denied { map } for pid=1980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:50 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x5) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 910.840166] XFS (loop5): Invalid superblock magic number [ 910.857604] audit: type=1400 audit(1537945250.484:14170): avc: denied { map } for pid=1980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 910.900706] audit: type=1400 audit(1537945250.524:14171): avc: denied { map } for pid=1980 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 911.006669] audit: type=1400 audit(1537945250.554:14172): avc: denied { map } for pid=1980 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 911.050361] audit: type=1400 audit(1537945250.684:14173): avc: denied { map_create } for pid=1982 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:50 executing program 3: r0 = socket(0x2, 0x2, 0x0) accept$nfc_llcp(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x60) shutdown(r0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000001}) dup2(r0, r1) [ 911.299224] audit: type=1400 audit(1537945250.734:14174): avc: denied { map } for pid=1980 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x726f7570) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 911.458178] audit: type=1400 audit(1537945250.774:14175): avc: denied { map_read map_write } for pid=1982 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:51 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0xcc) [ 911.609510] audit: type=1400 audit(1537945250.864:14176): avc: denied { map_create } for pid=1982 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 911.827141] audit: type=1400 audit(1537945250.884:14177): avc: denied { map } for pid=1980 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 911.983208] audit: type=1400 audit(1537945250.884:14178): avc: denied { map_read map_write } for pid=1982 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:00:51 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:00:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8100, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r2, &(0x7f0000006240)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000002640)=[{&(0x7f0000000300)="eb", 0x1}], 0x1, &(0x7f0000000040)=[@init={0x18, 0x84, 0x0, {0x1f, 0x1, 0x1000, 0x3}}], 0x18, 0x40800}], 0x1, 0x10) 07:00:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7a00000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 912.445873] XFS (loop5): Invalid superblock magic number 07:00:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:52 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0xcc) 07:00:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x47030000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:53 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:00:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:53 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0xcc) [ 914.296494] XFS (loop5): Invalid superblock magic number 07:00:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xe0000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000001, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000380)={{0xa, 0x4e20, 0x0, @mcast2, 0x7fff}, {0xa, 0x4e23, 0x6000, @dev={0xfe, 0x80, [], 0x1e}, 0x2}, 0x6, [0x200, 0x1, 0xbbd, 0x80000000, 0x800, 0x1f, 0x5]}, 0x5c) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x25, &(0x7f0000000100)={0x0, {{0x2, 0x0, @local}}}, 0x1b) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x2c2080, 0x0) ioctl$KVM_SET_PIT(r4, 0x8048ae66, &(0x7f0000000200)={[{0x7, 0x5, 0xffffffff, 0x7ff, 0x3, 0x10000, 0x400, 0x100000000, 0xfff, 0x0, 0x0, 0x1fa, 0xfffffffffffffffc}, {0x8000, 0x7, 0x7ff, 0x40, 0x2, 0xff, 0x1, 0x3f, 0x3ff, 0x100000001, 0x0, 0xabf, 0x1}, {0x2, 0x7ff, 0x10000, 0x2, 0x6, 0x4, 0x2, 0x0, 0x2, 0xf2, 0x3870, 0x5, 0x4}], 0x7}) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet6_tcp_int(r2, 0x6, 0x1, &(0x7f0000000400)=0xf, 0x4) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x12}, @loopback, @empty, 0x9, 0x4, 0x0, 0x100, 0x8a, 0x0, r5}) 07:00:54 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:00:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:54 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0xcc) 07:00:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7a000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 915.705566] XFS (loop5): Invalid superblock magic number [ 915.782519] kauditd_printk_skb: 167 callbacks suppressed [ 915.782536] audit: type=1400 audit(1537945255.504:14346): avc: denied { map } for pid=2074 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:55 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0020000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:55 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 916.004008] audit: type=1400 audit(1537945255.514:14347): avc: denied { map } for pid=2074 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:55 executing program 3: prctl$getname(0x10, &(0x7f0000000400)=""/96) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774d22) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r0, 0x0) [ 916.220494] audit: type=1400 audit(1537945255.564:14348): avc: denied { map } for pid=2075 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xad04, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 916.414622] audit: type=1400 audit(1537945255.634:14349): avc: denied { map } for pid=2074 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:56 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0xcc) [ 916.564235] audit: type=1400 audit(1537945255.644:14350): avc: denied { map } for pid=2075 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 916.772518] audit: type=1400 audit(1537945255.664:14351): avc: denied { map } for pid=2074 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 916.948266] audit: type=1400 audit(1537945255.674:14352): avc: denied { map } for pid=2075 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.116053] audit: type=1400 audit(1537945255.694:14353): avc: denied { map } for pid=2087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:56 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 917.259405] audit: type=1400 audit(1537945255.704:14354): avc: denied { map } for pid=2087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.409393] audit: type=1400 audit(1537945255.764:14355): avc: denied { map } for pid=2087 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:00:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4703, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 917.471034] XFS (loop5): Invalid superblock magic number 07:00:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x600) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:57 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0xcc) 07:00:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:57 executing program 3: r0 = inotify_init1(0x20001) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4207, r1, 0x201, &(0x7f0000000080)={&(0x7f0000000180)}) 07:00:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:00:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6c, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:58 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0xcc) [ 918.821504] XFS (loop5): Invalid superblock magic number 07:00:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:00:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7400) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:00:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8913, &(0x7f0000000080)={"62726964676530000000008000", &(0x7f0000000180)=@ethtool_wolinfo={0x6, 0x0, 0x0, "0148b88896d8"}}) 07:00:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:00:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7f01000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:00:59 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0xcc) [ 920.238793] XFS (loop5): Invalid superblock magic number 07:01:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2a0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 920.787275] kauditd_printk_skb: 169 callbacks suppressed [ 920.787290] audit: type=1400 audit(1537945260.514:14525): avc: denied { prog_load } for pid=2189 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:01:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x47030000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 920.910776] audit: type=1400 audit(1537945260.514:14526): avc: denied { map } for pid=2188 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:00 executing program 3: socketpair$inet6(0xa, 0x0, 0x100000001, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = epoll_create1(0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) close(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/current\x00') sendfile(r1, r2, &(0x7f0000000240), 0x8a) 07:01:00 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 921.053116] audit: type=1400 audit(1537945260.544:14527): avc: denied { prog_load } for pid=2189 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:01:00 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xcc) 07:01:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x3) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 921.219795] audit: type=1400 audit(1537945260.544:14528): avc: denied { map } for pid=2192 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 921.356725] audit: type=1400 audit(1537945260.574:14529): avc: denied { map } for pid=2192 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 921.534919] audit: type=1400 audit(1537945260.584:14530): avc: denied { map } for pid=2188 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 921.724226] audit: type=1400 audit(1537945260.614:14531): avc: denied { map } for pid=2188 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 921.777667] XFS (loop5): Invalid superblock magic number 07:01:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xc4000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 921.943560] audit: type=1400 audit(1537945260.664:14532): avc: denied { map } for pid=2192 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:01 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6800, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 922.164803] audit: type=1400 audit(1537945260.674:14533): avc: denied { map } for pid=2196 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.315091] audit: type=1400 audit(1537945260.694:14534): avc: denied { map } for pid=2188 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:02 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0xcc) 07:01:02 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) 07:01:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff030000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:03 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x480) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 923.748488] XFS (loop5): Invalid superblock magic number 07:01:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xb800, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:03 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0xcc) 07:01:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000bf6000/0x1000)=nil, 0x1000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x10200000008) 07:01:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:04 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:04 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0xcc) 07:01:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x48) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 925.391296] XFS (loop5): Invalid superblock magic number 07:01:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x300, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 925.798524] kauditd_printk_skb: 205 callbacks suppressed [ 925.798539] audit: type=1400 audit(1537945265.524:14740): avc: denied { map } for pid=2287 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 925.974481] audit: type=1400 audit(1537945265.524:14741): avc: denied { map } for pid=2299 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), &(0x7f0000000240)}}, &(0x7f00000002c0)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000000)=""/7, 0x7}], 0x1) r2 = gettid() ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000000040)) r3 = geteuid() r4 = getegid() write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0x0, 0x2, {0x2, 0x10000, 0x0, {0x6, 0x9e, 0x2, 0x7be, 0x8, 0xa67b, 0x9, 0x7, 0x3f, 0x5, 0x374b, r3, r4, 0x0, 0x2}}}, 0x78) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, &(0x7f0000001680)) tkill(r2, 0x15) 07:01:05 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 926.194224] audit: type=1400 audit(1537945265.614:14742): avc: denied { map } for pid=2299 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:05 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0xcc) [ 926.343935] audit: type=1400 audit(1537945265.624:14743): avc: denied { map } for pid=2287 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 926.487834] audit: type=1400 audit(1537945265.644:14744): avc: denied { map } for pid=2302 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 926.664571] audit: type=1400 audit(1537945265.644:14745): avc: denied { map } for pid=2287 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x400000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 926.849767] audit: type=1400 audit(1537945265.664:14746): avc: denied { map } for pid=2302 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 926.963626] XFS (loop5): Invalid superblock magic number 07:01:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4c, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 927.054268] audit: type=1400 audit(1537945265.694:14747): avc: denied { map } for pid=2302 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xf001, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 927.198763] audit: type=1400 audit(1537945265.704:14748): avc: denied { map } for pid=2299 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:07 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 927.354826] audit: type=1400 audit(1537945265.724:14749): avc: denied { map } for pid=2302 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:07 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xcc) 07:01:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000080)={0x3, 0x1, 'client0\x00', 0x1, "a7ea91a11a8e7263", "5b8bb837c8fb106dfdf3c2dba063a8a41bc53bcba39becc0e0c40e6472846b28", 0x4, 0x7}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)) [ 928.212092] XFS (loop5): Invalid superblock magic number 07:01:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa00000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x8096980000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:08 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x300000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:08 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0xcc) 07:01:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$UI_SET_EVBIT(r1, 0xc06855c8, 0x1f) 07:01:09 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x74000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 929.758464] XFS (loop5): Invalid superblock magic number 07:01:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:10 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xcc) [ 930.813232] kauditd_printk_skb: 152 callbacks suppressed [ 930.813248] audit: type=1400 audit(1537945270.534:14902): avc: denied { map } for pid=2414 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x700000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0xae78, &(0x7f0000000200)={0x0, 0x0, @ioapic}) 07:01:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x68000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:10 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 931.081745] audit: type=1400 audit(1537945270.584:14903): avc: denied { prog_load } for pid=2407 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 931.231590] audit: type=1400 audit(1537945270.634:14904): avc: denied { map } for pid=2403 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.255483] audit: type=1400 audit(1537945270.634:14905): avc: denied { map } for pid=2401 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.279655] audit: type=1400 audit(1537945270.654:14906): avc: denied { map } for pid=2414 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.311927] audit: type=1400 audit(1537945270.654:14907): avc: denied { map } for pid=2414 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.447616] audit: type=1400 audit(1537945270.654:14908): avc: denied { map } for pid=2414 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.624568] audit: type=1400 audit(1537945270.674:14909): avc: denied { map } for pid=2401 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:11 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0xcc) [ 931.751193] XFS (loop5): Invalid superblock magic number [ 931.830972] audit: type=1400 audit(1537945270.694:14910): avc: denied { map } for pid=2404 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 932.071681] audit: type=1400 audit(1537945270.724:14911): avc: denied { map } for pid=2403 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x400000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:12 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xf6ffffff) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) sendmsg$nl_route(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@bridge_setlink={0x50, 0x13, 0x0, 0x70bd26, 0x25dfdbfd, {0x7, 0x0, 0x0, r4, 0x20020, 0x44180}, [@IFLA_MAP={0x24, 0xe, {0x2, 0x100000001, 0x83c2, 0x401, 0x7, 0x3d2c}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xffffffffffffffff}, @IFLA_IFALIASn={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x40) 07:01:12 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0xcc) 07:01:13 executing program 0: socket$pppoe(0x18, 0x1, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 933.382016] XFS (loop5): Invalid superblock magic number 07:01:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x10000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:13 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x4, 0x22002800fd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = epoll_create1(0x7ffff) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(r2, &(0x7f00000000c0)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r4 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r0, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r4, 0x7005) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000340)=0x8) getresuid(&(0x7f0000000440)=0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$void(r3, 0xc0045c77) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) r7 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r7) eventfd2(0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff1026254480b0ea10cf5441a24aaf5f4af1073dfc57c284d96415b095c900fd947348d55aff1da433b7098fb2cd198e72d96d669850f712a613096a909289d25bb0fe99ad92", 0x81, 0x69}], 0x80, &(0x7f0000000d80)=ANY=[@ANYBLOB=',dmask=00000000000000000000000,nls=cp862,uid=', @ANYRESHEX=r6]) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) 07:01:13 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0xcc) 07:01:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x48000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:14 executing program 0: socket$pppoe(0x18, 0x1, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:14 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0xcc) 07:01:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4c000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 935.274185] XFS (loop5): Invalid superblock magic number 07:01:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x55c29971c5, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:15 executing program 0: socket$pppoe(0x18, 0x1, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 935.867857] kauditd_printk_skb: 124 callbacks suppressed [ 935.867873] audit: type=1400 audit(1537945275.594:15036): avc: denied { map } for pid=2493 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 935.903207] ntfs: (device loop3): parse_options(): Unrecognized mount option . 07:01:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xf0ffff) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 936.061363] audit: type=1400 audit(1537945275.654:15037): avc: denied { map } for pid=2493 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:15 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r2 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000180)) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r2, &(0x7f00000008c0), 0x1000) prlimit64(0x0, 0xf, &(0x7f0000002940)={0x3}, &(0x7f0000002900)) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000002c0)={0x62, @local, 0x4e23, 0x2, 'fo\x00', 0x1, 0x6, 0x4b}, 0x2c) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000027c0)={{0x3, 0x0, 0x4, 0x3, 0x8}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) r4 = getpid() tkill(r4, 0x1000000000015) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105517, &(0x7f0000001000)) sendfile(r1, r1, &(0x7f0000000000)=0xa00, 0x2000005) ioctl$LOOP_CLR_FD(r2, 0x4c01) gettid() [ 936.272629] audit: type=1400 audit(1537945275.704:15038): avc: denied { map } for pid=2510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 936.473956] audit: type=1400 audit(1537945275.734:15039): avc: denied { map } for pid=2510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:16 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0xcc) 07:01:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xad040000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 936.654276] audit: type=1400 audit(1537945275.754:15040): avc: denied { map } for pid=2493 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 936.804864] audit: type=1400 audit(1537945275.754:15041): avc: denied { map } for pid=2510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 936.991715] audit: type=1400 audit(1537945275.784:15042): avc: denied { map } for pid=2510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:16 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 937.178044] audit: type=1400 audit(1537945275.834:15043): avc: denied { map } for pid=2510 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 937.392205] audit: type=1400 audit(1537945275.864:15044): avc: denied { map } for pid=2510 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 937.432758] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 [ 937.458559] XFS (loop5): Invalid superblock magic number 07:01:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x3f00) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7a, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:18 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0xcc) 07:01:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@mcast2, 0x0, 0x0, 0x0, 0xc}, 0x20) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000300), 0xffffffffffffffb0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x204000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000080)) 07:01:18 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 939.268636] XFS (loop5): Invalid superblock magic number 07:01:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:19 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0xcc) 07:01:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x5, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:19 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 940.036914] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 940.130434] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 07:01:19 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf75, 0x60400) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x15, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x700}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) 07:01:20 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0xcc) [ 940.842642] XFS (loop5): Invalid superblock magic number [ 940.954027] kauditd_printk_skb: 123 callbacks suppressed [ 940.954045] audit: type=1400 audit(1537945280.674:15168): avc: denied { map } for pid=2589 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 941.100701] audit: type=1400 audit(1537945280.684:15169): avc: denied { prog_load } for pid=2597 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 941.249794] audit: type=1400 audit(1537945280.684:15170): avc: denied { map } for pid=2589 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 941.450120] audit: type=1400 audit(1537945280.724:15172): avc: denied { prog_load } for pid=2597 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:01:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x700000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:21 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a6dbe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000000)={'teql0\x00', @ifru_addrs=@generic={0x13, "7498747c6fc67815f5260e51f1e5"}}}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040), &(0x7f0000000080)="426f8a3ee9d4264d56c120", 0xb, 0xfffffffffffffffb) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x4) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'bridge0\x00', {0x2, 0x4e24, @multicast1}}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000200)={0x52}, 0x4) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x1d2a) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) socket$inet6(0xa, 0x80000, 0x2) lsetxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="04099ba55d7efadd982cf08362ffbbacff74ef3bc26c92d9a0f358049fc1d556a3c0dd8615ad9cb8000ec9dd7df664ded1ec30487c256ad28efe60c236fbccade37b9f888d72ee014fe24803121b3b9de475b85f2f36a0b56fe9d379ed2de5790a5f867ee95491443787ac1cb3f09b99806732cd"], 0xd, 0x3) [ 941.658841] audit: type=1400 audit(1537945280.724:15173): avc: denied { map } for pid=2602 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xf0ffffffffffff) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 941.865093] audit: type=1400 audit(1537945280.724:15171): avc: denied { map } for pid=2603 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:21 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0xcc) [ 942.000431] audit: type=1400 audit(1537945280.744:15174): avc: denied { map } for pid=2602 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.139568] audit: type=1400 audit(1537945280.744:15175): avc: denied { map } for pid=2603 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6c00000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 942.276933] audit: type=1400 audit(1537945280.784:15176): avc: denied { map } for pid=2602 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.436710] audit: type=1400 audit(1537945280.804:15177): avc: denied { map } for pid=2603 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.512861] XFS (loop5): Invalid superblock magic number [ 942.588224] FAULT_INJECTION: forcing a failure. [ 942.588224] name failslab, interval 1, probability 0, space 0, times 0 [ 942.683663] CPU: 1 PID: 2635 Comm: syz-executor0 Not tainted 4.19.0-rc5+ #33 [ 942.690930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.700313] Call Trace: [ 942.702932] dump_stack+0x1c4/0x2b4 [ 942.706594] ? dump_stack_print_info.cold.2+0x52/0x52 [ 942.711823] ? mark_held_locks+0x130/0x130 [ 942.716098] should_fail.cold.4+0xa/0x17 [ 942.720192] ? __switch_to_asm+0x34/0x70 [ 942.724289] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 942.729422] ? check_preemption_disabled+0x48/0x200 [ 942.734469] ? __switch_to_asm+0x40/0x70 [ 942.738566] ? perf_trace_lock+0x14d/0x7a0 [ 942.742831] ? __schedule+0x874/0x1ed0 [ 942.746763] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 942.751981] ? zap_class+0x640/0x640 [ 942.755729] ? __sched_text_start+0x8/0x8 [ 942.759912] ? graph_lock+0x170/0x170 [ 942.763739] ? find_held_lock+0x36/0x1c0 [ 942.767838] ? find_held_lock+0x36/0x1c0 [ 942.771936] __should_failslab+0x124/0x180 [ 942.776192] should_failslab+0x9/0x14 [ 942.780021] kmem_cache_alloc+0x47/0x730 [ 942.784103] ? trace_hardirqs_on+0xbd/0x310 [ 942.788442] ? kasan_check_read+0x11/0x20 [ 942.792610] ? avc_compute_av+0x2c5/0x800 [ 942.796790] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 942.802273] avc_alloc_node+0x2a/0x5e0 [ 942.806197] avc_compute_av+0x2d1/0x800 [ 942.810190] ? avc_has_perm+0xe4/0x7e0 [ 942.814095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.819662] ? avc_alloc_node+0x5e0/0x5e0 [ 942.823827] ? kasan_check_read+0x11/0x20 [ 942.827995] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 942.833299] ? zap_class+0x640/0x640 [ 942.837055] ? rcu_bh_qs+0xc0/0xc0 [ 942.840651] avc_has_perm+0x3c9/0x7e0 [ 942.844491] ? avc_has_perm_noaudit+0x630/0x630 [ 942.849202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.854781] ? check_preemption_disabled+0x48/0x200 [ 942.859832] ? debug_smp_processor_id+0x1c/0x20 [ 942.864615] ? perf_trace_lock+0x14d/0x7a0 [ 942.868870] ? rcu_bh_qs+0xc0/0xc0 [ 942.872452] ? __fget+0x4d1/0x740 [ 942.875944] sock_has_perm+0x2b1/0x3e0 [ 942.879851] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 942.885241] ? perf_trace_lock+0x14d/0x7a0 [ 942.889514] ? find_held_lock+0x36/0x1c0 [ 942.893616] selinux_socket_connect_helper.isra.46+0xc8/0x760 [ 942.899543] ? selinux_netcache_avc_callback+0x50/0x50 [ 942.904853] ? lock_release+0x970/0x970 [ 942.908858] ? arch_local_save_flags+0x40/0x40 [ 942.913477] ? usercopy_warn+0x110/0x110 [ 942.917596] selinux_socket_connect+0x46/0x80 [ 942.922125] security_socket_connect+0x60/0xc0 [ 942.926741] __sys_connect+0x297/0x4c0 [ 942.930663] ? __ia32_sys_accept+0xb0/0xb0 [ 942.934930] ? __sb_end_write+0xd9/0x110 [ 942.939035] ? do_syscall_64+0x9a/0x820 [ 942.943044] ? do_syscall_64+0x9a/0x820 [ 942.947058] ? lockdep_hardirqs_on+0x421/0x5c0 [ 942.951673] ? trace_hardirqs_on+0xbd/0x310 [ 942.956034] ? __ia32_sys_read+0xb0/0xb0 [ 942.960131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.965534] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 942.971037] __x64_sys_connect+0x73/0xb0 [ 942.975147] do_syscall_64+0x1b9/0x820 [ 942.979066] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.984466] ? syscall_return_slowpath+0x5e0/0x5e0 [ 942.989420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.994292] ? trace_hardirqs_on_caller+0x310/0x310 [ 942.999335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 943.004375] ? prepare_exit_to_usermode+0x291/0x3b0 [ 943.009421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 943.014303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.019515] RIP: 0033:0x457579 [ 943.022728] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 943.041666] RSP: 002b:00007faf9ececc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 943.049406] RAX: ffffffffffffffda RBX: 00007faf9ececc90 RCX: 0000000000457579 [ 943.056694] RDX: 000000000000001e RSI: 0000000020000000 RDI: 0000000000000003 [ 943.063986] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 943.071287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faf9eced6d4 [ 943.078585] R13: 00000000004bdae6 R14: 00000000004cc5f8 R15: 0000000000000005 07:01:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1c, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff03, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 944.533522] XFS (loop5): Invalid superblock magic number 07:01:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x3800000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x8004, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:24 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xebffffff00000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:24 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0xcc) 07:01:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6c00, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 945.599812] XFS (loop5): Invalid superblock magic number [ 945.981383] kauditd_printk_skb: 202 callbacks suppressed [ 945.981399] audit: type=1400 audit(1537945285.704:15380): avc: denied { map } for pid=2703 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.157452] audit: type=1400 audit(1537945285.754:15381): avc: denied { map } for pid=2703 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.197620] audit: type=1400 audit(1537945285.774:15382): avc: denied { map } for pid=2703 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.297325] audit: type=1400 audit(1537945285.794:15383): avc: denied { map } for pid=2708 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.323389] audit: type=1400 audit(1537945285.804:15384): avc: denied { map_create } for pid=2706 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 946.349947] audit: type=1400 audit(1537945285.824:15385): avc: denied { map } for pid=2708 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.383625] audit: type=1400 audit(1537945285.874:15386): avc: denied { map } for pid=2703 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.411784] audit: type=1400 audit(1537945285.884:15387): avc: denied { map } for pid=2708 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.439799] audit: type=1400 audit(1537945285.914:15388): avc: denied { map } for pid=2703 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.468253] audit: type=1400 audit(1537945285.914:15389): avc: denied { map } for pid=2708 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000fcffffff0000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000a0ea864eccd2ce5ea2"], 0x60}}, 0x4000) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0209000902000000000100000000000047beeadd2045b85ff1ff34c9bf9ee7e0e063be3e5986a15b8ff1047c218506628e149c02a64a92436560f44d92437f11d01b826403b645fd7382a0188b9705547635db350d9cfcf0c22901bd270a76557ce44f55e7cad4882385c983908105ce835957497a25b15d1d36a08453bf667ced542ab579a6b683b6a8db2a5e2fc7f6b23df02e29a282897d963aee7a10e06147b1db1e2adfca3eb5109d7504"], 0x10}}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 07:01:27 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x6, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xa002000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:27 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0xcc) 07:01:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x80040000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x48000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:27 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0xcc) 07:01:27 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x2000001e) 07:01:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x600, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 947.861679] XFS (loop5): Invalid superblock magic number 07:01:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:28 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='\x00'}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000280)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000140)=""/26, 0x1a, 0x5}, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.events\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180), 0x85, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100, 0x0, 0x5027, 0x0, 0x100000000, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x2000, 0x0, 0x7f, 0x0, 0x0, 0x1}, 0x0, 0x10, r0, 0x0) 07:01:28 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0xcc) 07:01:28 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = socket$pppoe(0x18, 0x1, 0x0) ftruncate(r1, 0x3) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6800000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 949.435414] XFS (loop5): Invalid superblock magic number 07:01:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4e02, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:29 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0xcc) 07:01:29 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x100) ioctl$TCSBRK(r0, 0x5409, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x80240) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x3) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x80000001) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x200, 0x410081) mlockall(0xfc) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000240)=ANY=[@ANYBLOB="06000000180000000300000000251d64988104fe326a0bc4c5d80d14013f00000004ab00005e00cf0000000000a33262ab460f1876549d761256861f21a8e89dee1e102c3d915304c8e65f20909f1bf1a6a1848114d838f76987d91f42b771f8ce3af6a13b4b1594d314d1c08c9cb0d64839b046b069a4bfda1fc7aa1c7b51d23046508ee467d610136ea7ba2e90f43ff5dab72e9a649764abe7febd10ed4975c855f6ade1477a903a68ab82"]) unshare(0x40000000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{0x9}, 'port0\x00', 0x0, 0x0, 0x6, 0x10000, 0x1, 0x1, 0x101}) 07:01:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6c00) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x100000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 950.471951] Unknown ioctl 22024 [ 950.535863] Unknown ioctl 22024 07:01:30 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000000c0)=0x940, &(0x7f0000000100)=0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b3000000", @ANYRES16=r3, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x81}, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000480)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x1, r4, 0x3c, 0x0, @in6={0xa, 0x4e20, 0x3, @empty, 0x1000}}}, 0xa0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 950.993280] kauditd_printk_skb: 150 callbacks suppressed [ 950.993297] audit: type=1400 audit(1537945290.714:15540): avc: denied { map } for pid=2805 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.162083] audit: type=1400 audit(1537945290.714:15541): avc: denied { map } for pid=2805 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.216909] IPVS: ftp: loaded support on port[0] = 21 07:01:31 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0xcc) [ 951.532746] audit: type=1400 audit(1537945290.814:15542): avc: denied { map } for pid=2805 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.603681] XFS (loop5): Invalid superblock magic number [ 951.789830] audit: type=1400 audit(1537945290.854:15543): avc: denied { map } for pid=2805 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.814395] audit: type=1400 audit(1537945290.864:15544): avc: denied { map_create } for pid=2808 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 951.814432] audit: type=1400 audit(1537945290.874:15545): avc: denied { map } for pid=2805 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.814468] audit: type=1400 audit(1537945290.974:15546): avc: denied { map } for pid=2805 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.814497] audit: type=1400 audit(1537945291.024:15547): avc: denied { map } for pid=2805 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.814528] audit: type=1400 audit(1537945291.314:15549): avc: denied { map } for pid=2805 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.945538] IPVS: ftp: loaded support on port[0] = 21 07:01:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40, 0x0) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c01000004"], 0x15) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) ioctl$TCXONC(r2, 0x541b, 0x707000) 07:01:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7400000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7a00) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 952.534263] audit: type=1400 audit(1537945291.254:15548): avc: denied { map } for pid=2815 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd\x00') accept$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:32 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0xcc) 07:01:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x46100, 0x0) write$P9_RLOCK(r1, &(0x7f0000000080)={0x8, 0x35, 0x1}, 0x8) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@newae={0x40, 0x1e, 0x21, 0x0, 0x0, {{@in6=@ipv4={[], [], @dev}}, @in6=@mcast1}}, 0x40}, 0x8}, 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="9996417d334061f27a0748a055e6e158a4b44bd299b0b5ca04420517c8a823a2ba568e8a173ce0430ed9add971ad9830e45771d9997c1f259fa7d80b9b7ddd3f8c4b6fc9a0e2149f3f526247a53ba994ea74a88a39b2bade1c2b5fb24c7ba267fa0a9dbadae73940d5ed8dacc8418157ab3352e89aaf0cd346af5af9079262698a1bc355d02c580188fe6619bb8d3bed930e09786daa1f4d6dff562f9a14873133404531dc76044c8f58ee65f23ae6b77e14ede81e7b820051e8b8b823fefc7c4912c3ecbd0b1621e602fa1e1765c59ba7c1911826d8fabf029d4f08a58534a36cfd2d164548a0b0f83550d7f3", 0xed, 0xfffffffffffffff8) r3 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000380)='eth0\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x58, r3) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept4$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000b00)={0x0, @local, @rand_addr}, &(0x7f0000000b40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006840)={0x0, @rand_addr, @local}, &(0x7f0000006880)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006980)={'team0\x00', 0x0}) getsockname$packet(r1, &(0x7f00000069c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006a00)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000006b00)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000006c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006c40)={'vcan0\x00', 0x0}) ioctl$RTC_PIE_OFF(r1, 0x7006) getpeername$packet(r1, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006cc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006d00)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000006e00)=0xe8) accept$packet(r1, &(0x7f0000006f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000008940)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000008a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000008a80)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000008ac0)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000008bc0)=0xe8) accept4(r0, &(0x7f0000008c80)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000008d00)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000008e40)=0xe8) getpeername$packet(r1, &(0x7f0000008e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008ec0)=0x14) recvmmsg(r0, &(0x7f0000009800)=[{{&(0x7f0000008f00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009240)=[{&(0x7f0000008f80)=""/158, 0x9e}, {&(0x7f0000009040)=""/219, 0xdb}, {&(0x7f0000009140)=""/161, 0xa1}, {&(0x7f0000009200)=""/36, 0x24}], 0x4, &(0x7f0000009280)=""/213, 0xd5, 0x5da8000000000000}, 0x3}, {{&(0x7f0000009380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009400)=""/23, 0x17}, {&(0x7f0000009440)=""/58, 0x3a}, {&(0x7f0000009480)=""/243, 0xf3}, {&(0x7f0000009580)=""/152, 0x98}, {&(0x7f0000009640)=""/183, 0xb7}], 0x5, &(0x7f0000009780)=""/82, 0x52, 0x1e}, 0x3}], 0x2, 0x12001, &(0x7f0000009880)) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a080)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000a040)={&(0x7f00000098c0)={0x77c, r4, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x25c, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9e, 0x7, 0x5, 0x9}]}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xff56}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8312}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r9}, {0x12c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xf0}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8a}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}]}}, {{0x8, 0x1, r14}, {0xe0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfc}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x4, 0x8, 0x3ff, 0xfffffffffffffff8}, {0x57ff, 0x81, 0x5}, {0x8, 0x9, 0x200, 0xd6e}, {0x9, 0x0, 0xfffffffffffffffd}, {0x6, 0x9, 0x1, 0xffffffff}, {0x1e05e5f7, 0x4, 0x4, 0x2f1f}, {0x10001, 0x81, 0xc0b7, 0x1}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xa58d}}}]}}, {{0x8, 0x1, r15}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10000000}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x140, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x104, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x26000000000000}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x1, 0x9, 0x20, 0xdc}, {0x2, 0x9, 0x100000000, 0x1}, {0x8, 0x10001, 0x7, 0xffffffffffffffff}, {0x8, 0x1}]}}}]}}, {{0x8, 0x1, r22}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}]}, 0x77c}, 0x1, 0x0, 0x0, 0x8010}, 0x1) 07:01:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 953.228518] XFS (loop5): Invalid superblock magic number 07:01:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x29, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:33 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140)='syz_tun\x00', 0xfffffffffffffffb) keyctl$clear(0x7, r2) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000080)) 07:01:34 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0xcc) 07:01:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4c00) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x5000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:34 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0xec3cb9ac915778ed, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000740)={@ethernet={0x0, @dev}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7f7}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000140)=0x14) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback, 0x4e24, 0xfffffffffffffffe, 0x4e21, 0xfffffffffffffffa, 0x2, 0x0, 0xa0, 0xff, r2}, {0x3, 0x3, 0x4, 0x0, 0x10000, 0x2a2, 0x40, 0x40}, {0x0, 0x8154, 0x10001, 0x8}, 0x0, 0x6e6bb2, 0x3, 0x1}, {{@in6=@mcast2, 0x4d5, 0x3c}, 0x2, @in=@multicast2, 0x3507, 0x1, 0x2, 0xadd, 0x0, 0xfffffffffffffc01, 0x1f}}, 0xe8) io_setup(0x0, &(0x7f0000000240)=0x0) io_destroy(r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) dup(r0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000800)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x6}) [ 954.944607] XFS (loop5): Invalid superblock magic number 07:01:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x55c198faf5, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:35 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x3, @broadcast, 'teql0\x00'}}, 0x1e) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000080)=0xa76e, 0x8) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 07:01:35 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0xcc) 07:01:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1e1) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 956.005594] kauditd_printk_skb: 153 callbacks suppressed [ 956.005610] audit: type=1400 audit(1537945295.734:15703): avc: denied { map } for pid=2905 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4800, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 956.159269] audit: type=1400 audit(1537945295.774:15704): avc: denied { map } for pid=2910 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 956.328726] audit: type=1400 audit(1537945295.784:15705): avc: denied { map } for pid=2910 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 956.467424] audit: type=1400 audit(1537945295.824:15706): avc: denied { map } for pid=2905 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 956.544658] audit: type=1400 audit(1537945295.834:15707): avc: denied { map } for pid=2905 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:36 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000140)=[0xa1]) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x4, @broadcast, 'ip6tnl0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 956.732916] audit: type=1400 audit(1537945295.844:15708): avc: denied { map } for pid=2910 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 956.916633] audit: type=1400 audit(1537945295.854:15709): avc: denied { map } for pid=2910 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000580)={0x0, 0x0, 0x1, @thr={&(0x7f0000000400), &(0x7f0000000480)}}, &(0x7f00000005c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000640)={{}, {0x77359400}}, &(0x7f0000000680)) [ 957.134346] audit: type=1400 audit(1537945295.984:15710): avc: denied { map } for pid=2910 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.179966] XFS (loop5): Invalid superblock magic number 07:01:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xe000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 957.325400] audit: type=1400 audit(1537945296.004:15711): avc: denied { map } for pid=2910 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:37 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}, 0xcc) 07:01:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 957.604238] audit: type=1400 audit(1537945296.344:15712): avc: denied { map } for pid=2922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:37 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x8802) bind$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x5, 0x401, 0x2}, 0xc) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$P9_RWRITE(r3, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0x8}, 0xb) 07:01:38 executing program 3: 07:01:38 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0xcc) 07:01:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x10, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 958.878946] XFS (loop5): Invalid superblock magic number 07:01:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xf000000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:39 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000000c0)={0x4, 0xd35e, 0x8, 0x2, 0x3}) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x500000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:39 executing program 3: 07:01:40 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0xcc) 07:01:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x600000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 960.989441] XFS (loop5): Invalid superblock magic number [ 961.016443] kauditd_printk_skb: 128 callbacks suppressed [ 961.016459] audit: type=1400 audit(1537945300.744:15841): avc: denied { map } for pid=2995 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:40 executing program 3: [ 961.158828] Unknown ioctl 1077980836 07:01:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xb0030000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 961.200265] audit: type=1400 audit(1537945300.834:15842): avc: denied { map } for pid=3003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:41 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}, 0xcc) 07:01:41 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) connect$rds(r0, &(0x7f00000000c0)={0x2, 0x4e22, @local}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 961.380148] audit: type=1400 audit(1537945300.844:15843): avc: denied { map } for pid=2995 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 961.535727] audit: type=1400 audit(1537945300.864:15844): avc: denied { map } for pid=3003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x70756f72) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 961.703179] audit: type=1400 audit(1537945300.904:15845): avc: denied { map } for pid=2995 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 961.871186] audit: type=1400 audit(1537945300.904:15846): avc: denied { map } for pid=3003 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.066009] audit: type=1400 audit(1537945300.924:15847): avc: denied { map } for pid=3003 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:41 executing program 3: 07:01:41 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e22, @rand_addr=0x319}}}, 0x90) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'veth0_to_bond\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:42 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0xcc) [ 962.282608] audit: type=1400 audit(1537945300.954:15849): avc: denied { map } for pid=2995 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.450533] audit: type=1400 audit(1537945300.954:15848): avc: denied { map_create } for pid=3006 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 962.587983] audit: type=1400 audit(1537945301.014:15850): avc: denied { map } for pid=3003 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.628663] XFS (loop5): Invalid superblock magic number 07:01:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff00, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:43 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x4) setsockopt$inet_dccp_buf(r2, 0x21, 0xc0, &(0x7f00000000c0)="72c5bc201874328949356cac6105e6cf7fa27f462c25a9a68d65d60d2ac4beae88639cfbfc44719b2ff0e653f8273c521245f79f610a4b823ceaca69f3c051905a77c188721ec0c1c4ce5e11b7b9a3f636d3bf91ecb1978772a24c9f9632cc9e2a0a3e69cf8ca68f82fcda8cd2f959017c1618f601c7438c00a659258b6911205a923c3af6f424f74852b9dc0f0a5632e4ba327d523e4b87efbd4d1a3f006006888a897243189bddc0fd0284e933385db3df1cf8dfc5a8c2d7172fd04f58ec3c94ad4a4e9f28c59a0c19b9801c5ef01ea909ecf40a72df", 0xd7) write$UHID_INPUT2(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x95) 07:01:43 executing program 3: 07:01:43 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0xcc) 07:01:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x67637465) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 964.288151] XFS (loop5): Invalid superblock magic number 07:01:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:44 executing program 3: 07:01:44 executing program 0: r0 = request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='user\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x7f, 0x10080) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000003c0)=0x400) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)="c43311cd369b8e19c70e959e1071364a99852c8977b10435120e5783d07873b61b9b79f1ca39fc9923dae20bccbc53b6858a56d87bbaf55dd712fa92c185a0884c1a83de77f3a1c15c678a0c65b839fc7370327a041f2b852cf3cc6ad73d3f88f09eea1fc0cefc7104a7626d964bed1b7e02bf995e1817e4ee", 0x79, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) r5 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x400, 0x40040) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f00000001c0)={0x7, [0x101, 0x4c, 0x0, 0x7, 0x800, 0x0, 0x1202]}, &(0x7f0000000200)=0x12) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:44 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0xcc) 07:01:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6c00000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:45 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000200)={[{@fastboot='fastboot'}]}) [ 965.979446] XFS (loop5): Invalid superblock magic number [ 966.044465] kauditd_printk_skb: 165 callbacks suppressed [ 966.044480] audit: type=1400 audit(1537945305.764:16016): avc: denied { map } for pid=3106 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 966.232447] audit: type=1400 audit(1537945305.824:16017): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:46 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0xcc) [ 966.427776] audit: type=1400 audit(1537945305.854:16018): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:46 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_buf(r2, 0x29, 0x2d, &(0x7f0000000080)=""/24, &(0x7f00000000c0)=0x18) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 966.602846] audit: type=1400 audit(1537945305.944:16019): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x2000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 966.799501] audit: type=1400 audit(1537945305.954:16020): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 966.993692] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 967.012854] audit: type=1400 audit(1537945306.034:16021): avc: denied { map_create } for pid=3116 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 967.065182] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 967.120752] attempt to access beyond end of device [ 967.158499] loop3: rw=12288, want=8200, limit=20 [ 967.165726] audit: type=1400 audit(1537945306.074:16022): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.226133] attempt to access beyond end of device 07:01:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xc0000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 967.266403] loop3: rw=12288, want=12296, limit=20 [ 967.318359] F2FS-fs (loop3): Failed to get valid F2FS checkpoint [ 967.322558] audit: type=1400 audit(1537945306.104:16023): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.362224] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 967.420036] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 967.471425] attempt to access beyond end of device [ 967.513150] loop3: rw=12288, want=8200, limit=20 07:01:47 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x0, @random="e5b76068d538", 'bond_slave_1\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 967.562998] attempt to access beyond end of device [ 967.570283] audit: type=1400 audit(1537945306.234:16024): avc: denied { prog_load } for pid=3123 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 967.618110] loop3: rw=12288, want=12296, limit=20 07:01:47 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}, 0xcc) [ 967.679884] XFS (loop5): Invalid superblock magic number [ 967.705944] F2FS-fs (loop3): Failed to get valid F2FS checkpoint [ 967.824700] audit: type=1400 audit(1537945306.254:16025): avc: denied { prog_load } for pid=3123 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:01:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x28, r1, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) 07:01:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4e020000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:48 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6c000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:48 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000]}, 0xcc) [ 969.375743] netlink: 'syz-executor3': attribute type 1 has an invalid length. 07:01:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x500000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000002600)={{}, {}, {}, {}, {}, {}, {0x1000}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) [ 969.520966] XFS (loop5): Invalid superblock magic number 07:01:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2c, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:50 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0xfffffffffffffd8b) socketpair(0x0, 0x80000, 0x8001, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000000c0)) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:50 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0xcc) 07:01:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x40000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000580)={0x90}, 0x90) sync_file_range(r1, 0x0, 0x0, 0x2) [ 971.298559] XFS (loop5): Invalid superblock magic number 07:01:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 971.799997] kauditd_printk_skb: 150 callbacks suppressed [ 971.800058] audit: type=1400 audit(1537945311.524:16176): avc: denied { map_create } for pid=3224 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:01:51 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0xcc) [ 972.026857] audit: type=1400 audit(1537945311.534:16177): avc: denied { map } for pid=3226 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.164657] audit: type=1400 audit(1537945311.544:16178): avc: denied { map } for pid=3226 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 972.323639] audit: type=1400 audit(1537945311.614:16179): avc: denied { map } for pid=3226 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:52 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000100)=0x1000, 0x1000, 0x6) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000000c0)) [ 972.581438] audit: type=1400 audit(1537945311.614:16180): avc: denied { map } for pid=3226 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xc, 0x2009, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/2}, 0x18) [ 972.778127] audit: type=1400 audit(1537945311.624:16181): avc: denied { map } for pid=3227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.931610] audit: type=1400 audit(1537945311.644:16182): avc: denied { map } for pid=3227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x68000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 973.196268] audit: type=1400 audit(1537945311.684:16183): avc: denied { map } for pid=3226 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 973.253843] XFS (loop5): Invalid superblock magic number 07:01:53 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xcc) [ 973.441120] audit: type=1400 audit(1537945311.694:16184): avc: denied { map } for pid=3227 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x90030000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 973.606611] audit: audit_backlog=65 > audit_backlog_limit=64 07:01:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x68, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:53 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/connector\x00') ioctl$TIOCCBRK(r1, 0x5428) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0xffffffffffffff79) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0xec3cb9ac915778ed, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000740)={@ethernet={0x0, @dev}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7f7}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000140)=0x14) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback, 0x4e24, 0xfffffffffffffffe, 0x4e21, 0xfffffffffffffffa, 0x2, 0x0, 0xa0, 0xff, r2}, {0x3, 0x3, 0x4, 0x0, 0x10000, 0x2a2, 0x40, 0x40}, {0x0, 0x8154, 0x10001, 0x8}, 0x0, 0x6e6bb2, 0x3, 0x1}, {{@in6=@mcast2, 0x4d5, 0x3c}, 0x2, @in=@multicast2, 0x3507, 0x1, 0x2, 0xadd, 0x0, 0xfffffffffffffc01, 0x1f}}, 0xe8) io_setup(0x0, &(0x7f0000000240)=0x0) io_destroy(r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) dup(r0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000800)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x6}) 07:01:54 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0xcc) 07:01:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x68) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x480, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 975.111764] XFS (loop5): Invalid superblock magic number 07:01:55 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:55 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @empty, "3d5f741af0e8ccd313ce315e49d200"}}, 0x6) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:01:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xad04000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:55 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0xcc) 07:01:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xffffffeb) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:01:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x4400, 0x0) r2 = dup(r0) r3 = socket$inet6(0xa, 0x804, 0x800000000000016) ioctl(r3, 0x8912, &(0x7f0000000400)="153f6234488dd25d766070") ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000140)={r4, 0x2}) ioctl$sock_ifreq(r2, 0x89ae, &(0x7f0000000040)={'team0\x00', @ifru_data=&(0x7f0000000080)="c85a150bd4dbab6abd25c61069a2b90ed35892e3a24ea4a8b4f2f833118e22c1"}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) [ 976.823894] kauditd_printk_skb: 179 callbacks suppressed [ 976.823910] audit: type=1400 audit(1537945316.544:16338): avc: denied { map } for pid=3313 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:56 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x4, @broadcast, "73797a5f74356e2c59954de800ed2d00"}}, 0x1e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x117, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000300)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x80}, r3}}, 0x30) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @random="7bf166cc32b4", "73797a9f01c43bebe3b93f25c2980600"}}, 0xfffffffffffffe2e) socket$inet6(0xa, 0x0, 0x20000064) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x3c, 0x0, @in6={0xa, 0x4e21, 0x7, @remote, 0x5}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r5}}, 0x18) [ 976.914960] XFS (loop5): Invalid superblock magic number [ 977.034355] audit: type=1400 audit(1537945316.604:16339): avc: denied { map } for pid=3311 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 977.194225] audit: type=1400 audit(1537945316.634:16340): avc: denied { map } for pid=3311 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.389452] audit: type=1400 audit(1537945316.684:16341): avc: denied { map } for pid=3313 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff00000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:57 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}, 0xcc) [ 977.534222] audit: type=1400 audit(1537945316.714:16342): avc: denied { map } for pid=3313 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.646475] audit: type=1400 audit(1537945316.714:16343): avc: denied { map } for pid=3311 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.782693] audit: type=1400 audit(1537945316.734:16344): avc: denied { map } for pid=3311 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4000000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 977.985961] audit: type=1400 audit(1537945316.834:16345): avc: denied { map } for pid=3313 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 978.200659] audit: type=1400 audit(1537945316.834:16346): avc: denied { map } for pid=3311 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:01:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 978.414560] audit: type=1400 audit(1537945316.834:16347): avc: denied { map } for pid=3313 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 978.603701] [drm:drm_mode_legacy_fb_format] *ERROR* bad bpp, assuming x8r8g8b8 pixel format 07:01:58 executing program 3: syz_open_dev$sndseq(&(0x7f00000005c0)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x638, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x0, 0xfe, 0x1, [0xfffffffe]}) [ 978.834624] XFS (loop5): Invalid superblock magic number 07:01:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7400, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:58 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0xcc) 07:01:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:01:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x700, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:01:59 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x8002, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x8}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x0, r2}) fchown(r0, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r5, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote, @rand_addr}, 0x6) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0x17, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, "d53ab01df283e4d56fa56f6de7dfc37ae6bf3465656cb58ce6e1f8c9b407690d338413dad7cff42af4f36ead5fe7e28094c1e091133b38330b7922474e1a3d7d55a71fa8a4ae7991eee0d46449b4dfe3"}, 0xd8) close(r5) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r6, 0x0) 07:02:00 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0xcc) 07:02:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xfffffffffffff000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 980.669618] XFS (loop5): Invalid superblock magic number 07:02:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5fa98c155000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x17f, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:00 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) socket(0x12, 0x5, 0x3ff) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:01 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}, 0xcc) 07:02:01 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x800) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x10000000}) r2 = socket$netlink(0x10, 0x3, 0xfffffffffffffffc) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000000c0)=0x7, 0xfffffffffffffd28) setsockopt$sock_int(r2, 0x1, 0x1b, &(0x7f0000000180), 0x4) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r4}}, 0xc) [ 981.835372] kauditd_printk_skb: 171 callbacks suppressed [ 981.835389] audit: type=1400 audit(1537945321.544:16519): avc: denied { map } for pid=3412 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 981.957436] audit: type=1400 audit(1537945321.624:16520): avc: denied { map } for pid=3412 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.152330] audit: type=1400 audit(1537945321.654:16521): avc: denied { map } for pid=3412 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x48, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 982.289116] XFS (loop5): Invalid superblock magic number [ 982.293632] audit: type=1400 audit(1537945321.754:16522): avc: denied { map } for pid=3412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.507856] audit: type=1400 audit(1537945321.774:16523): avc: denied { map } for pid=3412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 982.718027] audit: type=1400 audit(1537945321.794:16524): avc: denied { map } for pid=3419 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xfffffff6) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:02 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0xcc) [ 982.936854] audit: type=1400 audit(1537945321.814:16525): avc: denied { map } for pid=3419 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:02 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0xfca, 0x9, 0x80000000, 0x15}, {0x4, 0x7ff, 0x6, 0x7}, {0x7fffffff, 0x3ff, 0x7fff, 0x5}, {0x4, 0xffffffffffffffff, 0x101, 0xaa4}]}, 0x10) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 983.209135] audit: type=1400 audit(1537945321.844:16526): avc: denied { map } for pid=3419 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.349164] audit: audit_backlog=65 > audit_backlog_limit=64 [ 983.382930] audit: audit_backlog=65 > audit_backlog_limit=64 07:02:03 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffa}, 0x0, 0x8) r2 = gettid() tkill(r2, 0x2) pselect6(0x40, &(0x7f0000000080), &(0x7f0000000fc0), &(0x7f0000013fc0), &(0x7f0000000100), &(0x7f0000000ff0)={&(0x7f00000001c0), 0x8}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) dup2(r0, r1) 07:02:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x800000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:03 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0xcc) [ 984.153778] XFS (loop5): Invalid superblock magic number 07:02:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:04 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, "73797a5fd200"}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:04 executing program 3: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, {{0xa, 0x0, 0x0, @dev}}}, 0xfffffffffffffcd3) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000180)=""/45, &(0x7f00000001c0)=0x56b) clock_getres(0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) 07:02:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4703000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:04 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xcc) 07:02:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4c) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 985.606572] XFS (loop5): Invalid superblock magic number 07:02:05 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f00000000c0)) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2de9, 0x8000) write$FUSE_WRITE(r2, &(0x7f0000000140)={0x18, 0xfffffffffffffffe, 0x8, {0x8}}, 0x18) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8000, 0x0) 07:02:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) io_setup(0x101, &(0x7f00000000c0)=0x0) io_submit(r1, 0x159, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000)="c6dd0b3c5fdbf27fd3c85c174a56c4be04098ef584936847bfd20159f73e2bb98226baf91c6303dc6ac8060c73d056e341eb93d37ca60217c7238ea6805c9e6af8cc4aefe9bb9be7e02e8109102da1d35039a7a8abbc581f8eab1878374beaac649bbb09f301e6b7c0ee55ab5d8ea4d644dd31cfe7c28902183acf4c4542ee081438d99409152fd9f6fd3dc68ec1d39f2b32cc8ffffe66398ae55dba5470f2084425fd08413d2010096cb1e4b9d6b75cba2e9dadf80ad0f0ce50", 0xba}]) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000100)="042f1114b02f916beaefb5611d4a590bfc902972a6e01df43dc416d4ba35987dab2292119cba5258630e8490ce087baf70b0a1c47ddeef92371a2bb3fde79ead76eac79bbc4eab9e85f26b641357e57978fdb5b668da8f25dd1bd3dfc702870b7685b1dda06da650368c60b6d4918b92bf05d704104a44d0edeb8ad350225cfa390b123e4727d99f3fe68d1b72ef61049b0196bd95aba4bcaa713fcc4a983d5d2ff357dcb2491f2245c18b713609afa264357654bbc38c4224b20085d6") 07:02:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x200000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:06 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0xcc) 07:02:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6b6b6b00000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 986.850191] kauditd_printk_skb: 206 callbacks suppressed [ 986.850207] audit: type=1400 audit(1537945326.574:16729): avc: denied { map } for pid=3517 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:06 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) socketpair(0x2, 0x7, 0x42, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERRORu(r2, &(0x7f00000000c0)={0x15, 0x7, 0x1, {{0x8, 'syz_tun\x00'}, 0x8}}, 0x15) [ 987.007792] audit: type=1400 audit(1537945326.634:16730): avc: denied { map } for pid=3517 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.193973] audit: type=1400 audit(1537945326.644:16731): avc: denied { map } for pid=3517 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.223143] XFS (loop5): Invalid superblock magic number [ 987.368508] audit: type=1400 audit(1537945326.674:16732): avc: denied { map } for pid=3520 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4e000000, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x8004000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:07 executing program 3: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="00eeed7c49d8b84402ace1bd2ef20000b58eeace21a234ff55000000000100000000"]}) [ 987.567161] audit: type=1400 audit(1537945326.724:16733): avc: denied { map } for pid=3520 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:07 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0xcc) [ 987.689214] audit: type=1400 audit(1537945326.764:16734): avc: denied { map } for pid=3520 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.804798] audit: type=1400 audit(1537945326.804:16735): avc: denied { map } for pid=3517 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.960913] audit: type=1400 audit(1537945326.804:16736): avc: denied { map } for pid=3517 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.137618] audit: type=1400 audit(1537945326.844:16737): avc: denied { map } for pid=3520 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.324704] audit: type=1400 audit(1537945326.874:16738): avc: denied { map } for pid=3520 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 988.579230] XFS (loop5): Invalid superblock magic number 07:02:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xf000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:08 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x6}, [{0x2, 0x6, r2}, {0x2, 0x4, r3}, {0x2, 0x6, r4}, {0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x0, r7}], {0x4, 0x1}, [{0x8, 0x2, r8}, {0x8, 0x2, r9}], {0x10, 0x2}, {0x20, 0x6}}, 0x64, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x6, 0x81, 0x8}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r10, @in6={{0xa, 0x4e20, 0x5, @mcast1, 0x7}}, 0x3, 0x5, 0x1f, 0x8, 0xc0}, 0x98) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:08 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0xcc) 07:02:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x2, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:09 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}, 0xcc) 07:02:09 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000000c0)={{0x3, 0x0, 0x3, 0x2, 0x3}, 0x8, 0x4, 0xb89}) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000180)={0x57, 0x5, 0x4a656385, {0x89cd, 0x14ad}, {0x6, 0x3a}, @ramp={0x7, 0x5, {0x3, 0x0, 0x7ff, 0x4}}}) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 990.247623] XFS (loop5): Invalid superblock magic number 07:02:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb003, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe800) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 991.881563] kauditd_printk_skb: 200 callbacks suppressed [ 991.881580] audit: type=1400 audit(1537945331.604:16939): avc: denied { map } for pid=3621 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.048446] audit: type=1400 audit(1537945331.644:16940): avc: denied { map } for pid=3621 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.112409] audit: type=1400 audit(1537945331.684:16941): avc: denied { map } for pid=3625 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.138473] audit: type=1400 audit(1537945331.694:16942): avc: denied { map } for pid=3625 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.164657] audit: type=1400 audit(1537945331.714:16943): avc: denied { map } for pid=3625 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.192646] audit: type=1400 audit(1537945331.724:16944): avc: denied { map } for pid=3621 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.246840] audit: type=1400 audit(1537945331.734:16945): avc: denied { map } for pid=3625 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.282288] audit: type=1400 audit(1537945331.734:16946): avc: denied { map } for pid=3621 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.313634] XFS (loop5): Invalid superblock magic number [ 992.404242] audit: type=1400 audit(1537945331.784:16947): avc: denied { map } for pid=3625 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.547564] audit: type=1400 audit(1537945331.834:16948): avc: denied { map } for pid=3625 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:12 executing program 3: syz_emit_ethernet(0x9, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000080)={0x0, 0x0, [0x0, 0x0, 0x4]}) 07:02:12 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}, 0xcc) 07:02:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4800000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:12 executing program 0: socket$pppoe(0x18, 0x1, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7fff, 0x8002) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000100)={{0x100, 0x800, 0x7ed7, 0x6, 0x81, 0x4}, 0xece, 0x400, 0x8, 0x200, 0x1, "5458863b9d1e9d01aa1c1c2f6e20c8443180b7aa8d5107108d02189dbd288f697880840b95190ad0042884cf10017ce085efa0f985f57b7af3b613a90cc11f3c6364161d83a18c80f485d60f59172c4c13d25e2b86f9442c43463c4d55123f49ffe0c02e09ffa881e6fd30fccd947af064cb238728b35d7a23ceef0c046ba061"}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) socket$inet_udplite(0x2, 0x2, 0x88) 07:02:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb8, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6b6b6b00) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xffffffff00000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:12 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0xcc) 07:02:12 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x208501, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000500)={0x13, 0x7, 0x2, {{0x6, 'self(['}, 0x80000001}}, 0x13) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x10000, 0x40) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f00000000c0)) [ 993.316581] XFS (loop5): Invalid superblock magic number 07:02:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xcc020000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0xffffffff80000001) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x400) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x8, &(0x7f0000000140)=0x2) syz_mount_image$iso9660(&(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x7fffffff, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000380)="b286e3e3407026364fc0b3e7eb9a7820b83d", 0x12, 0x8001}, {&(0x7f00000003c0)="8f75692d8cbd1e2850b6b10ea799143a46d8be689440f58aebb02ff021390de51918b7664e0c5c01c144a57e272a05e0818ee7a36536d2de167ca6581b3cc882f5da2ab20f6058b60dea1619fd7d3364e2be81ecb4d863235500f59479a392cc1f4c319b42461be7b009743423c49d6cc0ea6c6ecd1a94d22a08f9f5bb42574688bd28f12ead5595abc6969db77c3963910c6ea0e3ec2a356784f8d29a7f30fff739790996524bb920b48095a87b26822102288266372a23", 0xb8, 0x6}, {&(0x7f0000000480)="e59cdec25644062242eee21e098af0741174904c79bc979df2fbe0704785d132140acfb00146e851ce13edd47827fe", 0x2f, 0x4}, {&(0x7f00000004c0)="c2534b60c230035d517b74b1ce8947ee0b7fd8d1efde6a40345263cce75ae3a58a72d4902a46d6ecc36cf301485fcadf19f2d32a58568026ad9ac3b9aaa44a2653e460120c89756c12b5d930a3eae1dd704811253d55469702cae4f5e53c2f4d11f6154cb88fd3c36fbdffae7bfcde1ba8303fd69e1f17d93a2e040328fbd3ff77bd70a27396b659d6c5234236aecff0718868cdc6cc162f921fba3aefe1dcca16f64eb3a99b9f6c80a4eff27bda8f4317ec7fcd6d58c420896dad48cff2bd0b423309e812e93c1fdc627ce57aa068203b246c8f89b67d07bf225d0f8fa63720f4552e841ba7", 0xe6, 0x4}, {&(0x7f00000005c0)="53289b864d3d31f7c393bd562abe950995127eafbb971834f81eb0e1edd38d794d913f83c753b25f7dc9fe2b7707c94a0e60591c493265708fdf28f18b975539a7615725df7227e47252f22c13060b85e326889b9125554a1c458e7bb758ca9221b6fcac36c7a18332bfc52dc69cc4ca1c0b9a1a85e944f0f8972d96ba595a5e12c9ed6b3946ccfec7366dd7a903d86de3901f11321cef068f4151e61f471cba8f49e05b797eb448f2bde15fb646b12ada1306c3509ee4741ee752f814159564a1f13c23cc0339cac2981d9fe487ae74678f68a63b4180c2", 0xd8, 0x4}], 0x14, &(0x7f0000000740)={[{@check_relaxed='check=relaxed'}, {@hide='hide'}, {@check_strict='check=strict'}, {@map_off='map=off'}], [{@smackfstransmute={'smackfstransmute', 0x3d, "76626f786e657431626465765d06"}}]}) ioctl$PIO_UNISCRNMAP(r0, 0x5412, &(0x7f0000000100)="b7") ioctl$FIBMAP(r0, 0x1, &(0x7f00000002c0)=0x6) 07:02:13 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0xcc) 07:02:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xc0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x80040000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:14 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) setsockopt(r0, 0x101, 0x3538, &(0x7f0000000200)="733af356f90dfa26a39240a0243207c658d4f374ae2021af3156e4f16d1e9679d60447921d7f05822d245ddfece1b7214632d581ea2c5127f7c7cf5b5a66ee66118118850d092931e514f348958c8679678f69e759c0e8759208c44e9fd09fdb03760203b049476f8b13844954d4e89cd0e3320fd2641ce9baa9bbd348b1941719", 0x81) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) write$evdev(r3, &(0x7f0000000340)=[{{0x77359400}, 0x2, 0x4, 0x9}], 0x18) r4 = dup3(r0, r1, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000380)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x2, @remote, 0x2}], 0x3c) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f00000002c0)=0xe, 0x4) 07:02:15 executing program 3: getpeername(0xffffffffffffff9c, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000180), 0x4) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000380)={[{@nouser_xattr='nouser_xattr'}]}) 07:02:15 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0xcc) 07:02:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:15 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x500, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) 07:02:16 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0xcc) [ 996.725198] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 996.760790] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 996.812071] attempt to access beyond end of device [ 996.847212] loop3: rw=12288, want=8200, limit=20 [ 996.883825] attempt to access beyond end of device 07:02:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa00, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 996.910363] kauditd_printk_skb: 184 callbacks suppressed [ 996.910378] audit: type=1400 audit(1537945336.634:17133): avc: denied { map } for pid=3714 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 996.938483] loop3: rw=12288, want=12296, limit=20 [ 996.981832] F2FS-fs (loop3): Failed to get valid F2FS checkpoint [ 997.049596] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 997.093883] audit: type=1400 audit(1537945336.674:17134): avc: denied { map } for pid=3714 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.138082] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 997.213965] attempt to access beyond end of device [ 997.253488] loop3: rw=12288, want=8200, limit=20 [ 997.268676] audit: type=1400 audit(1537945336.694:17135): avc: denied { map } for pid=3714 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.302077] attempt to access beyond end of device [ 997.345563] loop3: rw=12288, want=12296, limit=20 [ 997.384934] F2FS-fs (loop3): Failed to get valid F2FS checkpoint [ 997.483463] audit: type=1400 audit(1537945336.794:17136): avc: denied { map } for pid=3714 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:17 executing program 3: socket$kcm(0x29, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x6100a000, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100)=0xd23, 0x2) getpid() ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000000)={0x7, 0x2, 'client1\x00', 0x2, "a71d218c3b29312d", "8ca053667c5e3814847a19d09c020027a1b364f9f417db53982bf82424411ed5", 0xffffffff, 0x7}) setsockopt$inet6_buf(r0, 0x29, 0x4, &(0x7f0000000000), 0x0) 07:02:17 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x1) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0xffda) 07:02:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 997.677845] audit: type=1400 audit(1537945336.874:17137): avc: denied { map } for pid=3714 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:17 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0xcc) [ 997.876545] audit: type=1400 audit(1537945336.884:17138): avc: denied { map } for pid=3714 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.054223] audit: type=1400 audit(1537945336.994:17139): avc: denied { map } for pid=3714 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4603000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 998.240665] audit: type=1400 audit(1537945336.994:17140): avc: denied { map } for pid=3714 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x347, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 998.372737] audit: type=1400 audit(1537945337.034:17141): avc: denied { map } for pid=3720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.521881] audit: type=1400 audit(1537945337.054:17142): avc: denied { map } for pid=3720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:18 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0xcc) 07:02:18 executing program 0: socket$pppoe(0x18, 0x1, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 998.930207] IPVS: ftp: loaded support on port[0] = 21 [ 999.054896] XFS (loop5): Invalid superblock magic number 07:02:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf5fa98c155000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 999.419847] IPVS: ftp: loaded support on port[0] = 21 07:02:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x300000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:19 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0xcc) 07:02:19 executing program 3: socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2500, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000740)=""/242) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000a40)=ANY=[@ANYBLOB="1414bb01000000030000000002f2ddffffffffac14141219da7316d400000000000000008b55da7a1e461c2a93b5564c39724f1b90a5000000000000000000000000823799e611e09fd9db0c97b6581aeeeae7809a9ef1ebcc1e6e98d351ee34d5e97dfb544a89771e1defedd636a7d80943e8538b20a38cc4c147bcabe353bb1879e2541441d87ac94eeb463149c6162be84e4ee3d6286bce05d8ca7183da0b49732531f3ed096dde5a8b486ac179ae6b27604c59c76802832a571650c0e81699dd32d267aee465c7e00ee0d6312f5ec05e3c373aa7928b1431a644746b13760062d48c5e0ebcfd838c9732feb206a8a6d10a38"], 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r4 = socket$xdp(0x2c, 0x3, 0x0) fcntl$getown(r0, 0x9) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) bind$xdp(r4, &(0x7f0000000300)={0x2c, 0x1, r3, 0x0, 0xffffffffffffff9c}, 0x10) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0x3, 0x3}) write$P9_RREMOVE(r4, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7ff}) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r5) io_setup(0x0, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6370752f2e797a3104", 0x1ff) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a45323, &(0x7f0000000480)={{0x80000000000003, 0x9}, 'port1\x00', 0x20, 0x100000, 0x1, 0x5, 0x1c1, 0x0, 0x0, 0x0, 0x3, 0x6}) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x800) ioctl$TIOCSPGRP(r8, 0x5410, &(0x7f0000000000)) 07:02:19 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x4000, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x74000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4c00000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:21 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0xcc) 07:02:21 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000001c00)={0x100000001, 0x24, [0x7, 0x9, 0x7, 0xe9, 0x6, 0x9, 0x20, 0x1ff, 0x1]}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001300)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001340)={0x0, 0x0}, &(0x7f0000001380)=0xc) r4 = getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000013c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001400)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000015c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000001700)=0xe8) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() r14 = getpgid(0xffffffffffffffff) fstat(r0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000001c40), &(0x7f0000001c80)=0x14) fstat(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000001980)={0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000019c0)={0x0, 0x0}, &(0x7f0000001a00)=0xc) r19 = getegid() sendmsg$unix(r1, &(0x7f0000001bc0)={&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000012c0)=[{&(0x7f00000011c0)="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", 0xfe}], 0x1, &(0x7f0000001a40)=[@rights={0x28, 0x1, 0x1, [r1, r0, r0, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r1, r1]}, @rights={0x20, 0x1, 0x1, [r1, r1, r0, r0]}, @rights={0x30, 0x1, 0x1, [r1, r0, r1, r0, r0, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}], 0x160}, 0x40000) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000001100)=@req={0x13d9, 0x4a2e2153, 0x200}, 0x10) r20 = socket$pppoe(0x18, 0x1, 0x0) r21 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x400) setsockopt$inet6_dccp_buf(r21, 0x21, 0xc, &(0x7f00000000c0)="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", 0x1000) connect$pppoe(r20, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2c00, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1001.943108] kauditd_printk_skb: 169 callbacks suppressed [ 1001.943126] audit: type=1400 audit(1537945341.664:17312): avc: denied { map } for pid=3797 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.240559] audit: type=1400 audit(1537945341.674:17313): avc: denied { map } for pid=3806 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1002.393449] audit: type=1400 audit(1537945341.744:17314): avc: denied { map } for pid=3797 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.589962] audit: type=1400 audit(1537945341.754:17315): avc: denied { map } for pid=3806 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:22 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x181000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000003400)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)="cb41c22210949b68059d40751a213eed3fbbbb2313d19369ec1df6bb6527356e30b9bcc23756c03ee03b2bc22bd8d0f8552161be32370b4cbb54aedffb00287f3ed19fe1a62ff404621ecc1a07970d98d116fb30391e0d1e297a3d4538f47e97ec9f0345a220b3ffb5d07db41809c5ff8f580df70722bbb46fbda7b256755be26fe50a185cb07fe0c086875736cebd3834fed668bbb8ae8a0c5b0ef436b785bd8bfb19ba832cffaee71fc9b250e48fda5723bc580f91f41fb2924550c123cd27a807c8958cf2d1277b20f5b5d9c1a91809aafbe7", 0xd4}], 0x1, &(0x7f0000000400)=[{0x110, 0x11f, 0x6, "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"}], 0x110, 0x8000}, 0x80000000}, {{&(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @broadcast}, 0x0, 0x1, 0x1, 0x4}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000240)}, {&(0x7f00000005c0)="e4e72071870336b3d238b985b2d267e9", 0x10}, {&(0x7f0000000600)="64202b31fa49a08bc688906b7a30106ec111050a290911aa7390eabd61300770b95aee2b70ca590d33e46604da414293577c0a69bb0ac173f74b56f6e2ac2aa38cf22762379bd37c764622236a93d50e152a52d9df71328a9df406e4b39d1cbf59c9ba8f770f66e99142d7a8295dbb7eb3de70d92d2afbaf72802a49b4379f443a0313a2a0da15cfdbae7c62274f1ce7bb44896fcc5d78d2119786d3c5983dc8dce2030d8ac2119685c5d85e5508f0642137a600fbfe4c779f1e3451630de3a83a3d29a37ee7c1168802c881ab4235ba1e8e701670d2356b78f0fe7b9e02dbd7d6cbf3011573a0d596555711a6e5a17f3f0bb87a1b", 0xf5}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="21084c7294213cc12854fc4efa26f31c72f70125406324b3a4aa9a5a14ed2f8b568663eaafdee081fff181cc94dd61d9b81ba4c4ea2f9210ddc463a1adc046c2ad1ab7d0751aa83d0057795a545ae988efbb68458305d721cd4e95e3718beb1ad1e28a27d1f3f7bd3a738bf1fd41296ca16b21d301acb8106cc9d9579f18e2c26f870e679ca3f2b5ffb594e9c32e63a11c2f33547d274725a4b60d61b446a59f64c7dc7ee798c05013c569dbd109d587604c7d9cfe3fdfd2ef4c44c2ea13ec7065b593496b58e5713b8cac164e4247f4c8b6cab383bf31299b4569a8debb57c061bd85ca9816436c5995e393", 0xec}, {&(0x7f0000001800)="ee183cd7a8bdbbe4d137796cc01fb89e383b1f2c7b959fd163e5706b27", 0x1d}, {&(0x7f0000001840)="2cb56643c3cc6cea95c0f4cc389f3d2c31623cfb9d204ccdf99631b2c0416297104e78f0007949d196c42a45bd6f9cdc5c3c44453b060e", 0x37}, {&(0x7f0000001880)="584b8d80502d41e49447f49be54bdb28906ab018c65076a6540fbd2a6dd1ea91c1584cec00f2904f78f5a8f98886c9858a1f0ef819f5d55fd9a850c653036a7bbe5181c446a185dc78cdd486bca1099fab1bf4a3e798360b4eb7c3d8cca47ce2f6c5", 0x62}], 0x8, 0x0, 0x0, 0x10}, 0x1}, {{&(0x7f0000001980)=@ethernet={0x306}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001a00)="8c207f16e9a3fb172c20267df1976e4b2a20b422a2f969d008c24d9b242352ed83ecb59814c211bf705d9db35e39b15f1b19011210fe17f4ef95b7324d2a07f36267e2b549e04adf4e11532edad6047b28710fd87dbc1ddaec534fb4e093aea05966a1d77fc0cf7dfb152cf1b7af40521a176eeb33", 0x75}, {&(0x7f0000001a80)="d862ba72d6c742aa6071eeaf96e28483771e4e461e658841b17843b2f61f6cf16e8e7c1f13c03c4f4a3007db15d7a7733025de65d70be2c26da87950214f2076942c1c6d3a1c8b4916b363a487d90a86ba0657b4eb59f2aef0049e937f5864e02edf5ffe410b084fa0934943ef2ef9a16119056f4f8c7087f274943ac8b0ed72ca77d9379efe8413064c4da6e7acac8d34af0fbbc16a58cae1aef380c3a2b367e00578c695d459ddd3388750c695af68859dac11ca88c56e1db74033bf5ce7b6757dbe52f903d81526f798e9", 0xcc}, {&(0x7f0000001b80)="2ab95870893b23b16740df03e1f429b3392c92d33e42c7476930bcba7a30632d596798699ef727877656231a2596b1ea6ac265be0bad0f6fa10f9fe1070276460861bcf6c30cf4b55be6381aac6b", 0x4e}], 0x3, &(0x7f0000001c40)=[{0x70, 0x118, 0x6, "def4d952c8825261dab5457f4aedf1b68ef4d447ff6d6768fc5d7ea2033d45fe69459a9cee48b6a846ec5dcfd12cdac107b4dcee596fceb0ffc3c750c7b52ff2363fa4a2051ec6397a6ce04e6f4dede3e787e4293a0a2231cbca1d359f0316db"}, {0xa8, 0x11f, 0x400, "8fd38cfbf5462f6e75311854bd08d4b73fb7a48afeb9d4c60d2f2532873d0c375a3556a10c0d0d679e4f13a19150f862bfd0bdd47a19ff64d9c9ac3b91d1bb3b269b3cfbec4dd8fd92724877d8b17564993d87bff6ed84ef41df5a5210c4d5b0127289e5df5d749934351bb4348ec249140b630cbc2fe7a7705bc75f181c445f6e8bbb10b1f205196b359d18ee44ed13e7"}, {0xd8, 0x117, 0xae, "356fb671956fa26fa5b08f96d82deb465857657494177c697d95ee152de255575c6d5579734bba211963b9c324127c8d4cb0b74abf72dde7edfe46e22cd90867a736e836c30ff68d55b69980a08abf971deac29dbcd0ae3a481030a129186271bf5551530ec8112eac5090fde2c3daa687ef9f7c2039f42f376f09a861c76530bb421d7e1138a73c0e8530c9481486fac99fe5fb3b070800681910e1dc68eab145510e43c9edd6a34185722fd0404f2ce789a2d4fa848bc62258329a1ccd2f7beb7b40ba8f38"}, {0xc0, 0x12d, 0x8, "1136a5f22301bad2c8c5ff1787b832c2a43f7b8bce5de6d886b1111f1d75958353fa5cc35443258e0da229689f7b27f7c6abe18d3fee8795a08f54808c6c6982efeae6d5c2c80a070f4f86bd60a4416a727cfb257f823fce3ba19c249d8364f73e7457f0ba541cdd1026c5b7d96e62c5665c22c6742edacbcc6c459fcb9d69459b0f3bfe466157670bfb18cb8e7c752612be0a9c2a371737a58ed3a5665d61db05efee42577eba7498ad"}], 0x2b0}, 0x4}, {{&(0x7f0000001f00)=@in6={0xa, 0x4e23, 0x6, @mcast2, 0xfffffffffffffffd}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000001f80)="6ae1", 0x2}, {&(0x7f0000001fc0)="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", 0x1000}], 0x2, 0x0, 0x0, 0x800}, 0x6}, {{&(0x7f0000003000)=@rc={0x1f, {0x0, 0x0, 0xffffffffffffff00, 0x9, 0x401, 0xfff}, 0x80000000}, 0x80, &(0x7f0000003100)=[{&(0x7f0000003080)="f0b2c484625992191062e4a4b383c335d5d367246d84f5afc9e4160ce5cf04c352747947af2bc5853ad2a4f1beddcb7f65b1795a8ab745b954c7c65d952055d65ef50b3e904d2c44a0368f01a329373c431f67ac620bb2286ede8d", 0x5b}], 0x1, &(0x7f0000003140)=[{0xa8, 0x6, 0x7, "fa970ab599be16ad1308b05ab716014f08e9d94a8c84f9aa5215b8db32f5c22265cc12511303f109cff471230242274781a74ae984e9408f76598826bd067de976bf9cff1c1df725764cb8b7787390723d8da5f959e31d643038a0a39f4f0c575c9f48e72da4d2e560f26c259da6d7725cb593c5513a1845c808fa5356c2b3c6fb21dfb3b88fdc3355b23d06c74b98514bcc"}, {0x78, 0x1, 0x80, "c8ca42c9428a51504a2d43b1288e09c82c771bef793591e2c4a073cd1c5137f87d9490360e4e3eaf0ea5e803276ddc269628b47ffa799b278f901a06af51227c4d4f18941da38385c0399428bffdab425fdaba90a724b45df61c8e2c9c488b59f8bfe77ddfcd"}, {0xc0, 0x112, 0x8001, "b985223cdf7da19cf1f3ecdd73851a1d65579b3084e5525893c70ddf4d675c4ae26b0392ec57ae91770bbc5f990c6834da7d9727d88d0d7d9cd89b25bcf736448b3fe5ca4632ef27f97c6edb83ed9230b9e0502eccb060d83bf624416ea6b4379d4467bc7cbf52c7503d3ee9d16b08b7380bb2ccd816547cf21d91662adba8c0e51c0b80fc83a9a2a5c9b61565e6cc1238150ebfb972d50bba73fdb55e59583a58013795b956038a76860157"}, {0xb0, 0x0, 0x0, "5149ac0596792f7cdef4bf80bb49ab82bbcfada55970ab2140fb71fb9a01fc851ab4bcad503de5760cf0b04c13f6f8eae0b1eb58ad21573e5c6f3d9e345aa77893cbeff5500acd8109c1a4fd8ac49ce5a5172b077ed27f341fe68c2a14fabc492101a26d46672bcad3712d1df8c5a43b29b789d24b6f9a94a0eb18fb0435168fead4967368c2a5be91a3b90a3a8265e79a2b379e1c956d8930dc96f57e88"}], 0x290}, 0x2}], 0x5, 0x40000) r2 = semget(0x3, 0x0, 0x410) semctl$SEM_STAT(r2, 0x2, 0x12, &(0x7f0000000280)=""/102) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000040)={0xc, 0x100000001, {0x57, 0x20, 0x80, {0x101, 0x800}, {0x1000}, @ramp={0x3ff, 0x4, {0x8, 0x8c, 0x1f, 0xfffffffffffffff9}}}, {0x56, 0x0, 0x3, {0x5}, {0xadb, 0x101}, @ramp={0xfffffffffffffffd, 0x0, {0x400, 0x0, 0x8, 0x1f}}}}) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000180)={0xf, 0x0, {0x56, 0x9, 0xffffffff84000001, {0x2, 0x9}, {0x800, 0x100000000}, @cond=[{0x4, 0x20, 0x100000000, 0x4, 0x100000000, 0xad}, {0x100000001, 0x2, 0x7, 0x3, 0x5, 0xffff}]}, {0x57, 0x3f, 0x100000000, {0x4000003, 0x8}, {0x1c, 0x8}, @rumble={0x7cb, 0x4}}}) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)) 07:02:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x1000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1002.814278] audit: type=1400 audit(1537945341.754:17316): avc: denied { map } for pid=3806 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.994320] audit: type=1400 audit(1537945341.754:17317): avc: denied { map } for pid=3806 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.156808] audit: type=1400 audit(1537945341.804:17318): avc: denied { map } for pid=3797 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:23 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0xcc) [ 1003.356312] audit: type=1400 audit(1537945341.804:17319): avc: denied { map } for pid=3797 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.577461] audit: type=1400 audit(1537945341.854:17320): avc: denied { map } for pid=3806 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7a000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:23 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clock_settime(0x3, &(0x7f0000000040)={0x77359400}) sendmsg$alg(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000000c0)="4cd9d9821e5af550cc8717ead21994922dce11eef830491f031e8ae491ac1a370f26edaa2a43eeecbb4b1f614c9bbd352eb04723a3cbbf5e1e964c1b5974b6d10e0f1dd92b6ee4f4cd1c0a249ed11e361c39f50a4583d96ee29a08ee7defe101072f66330a893ab82c1895ebf1c5da17416cb85b8f66cdce5e7f45d4dab2322594652217f1e817b3bd0841bbb0f7cb620fd67e9c56ab3331d061f9d5bc59772a45eb65d1fc1e522652bc670903a5ec4398c2e2db629715", 0xb7}, {&(0x7f0000000180)="3c1ea2c26e34eed423d0573387213dd46527652cedfeba425d69781fa31ddad7e7f5bce60bf265a821cfe3b7f441694bfe468ab8bee102fab8e46287c9fc66023f549b91ea878e1939732eaf754f04b26e7829834df551b8bf66210cd28658aaeda21853ba9b77c960aadb33623ff59ba41d07b6c54006ece1de33d87d066c46e350b08b19a134dd7868d37f3b145e9f173c735f503a136fc01d46068e72e6b505755c", 0xa3}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="7a45168d14cfba38e05440be8be15578007cce047d488a0f9f32a4e31536f8760f31683bf08d0071c3b894d51f0c8fdea7796183b83f640fc9776d79f3307d7c8a", 0x41}, {&(0x7f00000012c0)="a57b3f3f2fb0c5426497c5a0dda53d9b5bfbff64ad1f13f693ad0abc269ba87668284adc18238bdca27024cc25bc42e2a63cbea905352a9e3a5061e6002f053b33e87e2dfbe6636f0df70ea11038d7f59851fc6b0b89998e599a4e5f321af1b1fd976661c976605dd0b1c4e913d148f66419a77f7b4046855630c2e71cd1dd5becbd4580d20e8c21b24a0fdddaab7746e54e27e1b5af00eda24fa31a24a19ebce82e611bc035c3549f65d246bb3e4b417318a82c1ef702f7549a94203d95af0249fed5a317ff39d83862f9d6df7eee9dc0fd069b0c68e0454af934c59fc842e25d8c562feb2135aa3e83a3d4aa6c0fa51179e85ab3e3", 0xf6}, {&(0x7f00000013c0)="c0395963e198fe5fb69edd1a68ecdeb1f00987463ffa3cbd389c585c91422925aec8fd7ab63227644fdaa9c10ec64c4c95e782eafa6a479462887598a7cccbaaaded0c0fa6b535100630ba9b3445dfd278af110c7ba796ff46a54003bebea80a29d5785ae7fcea05655c468c72f2feb1e427318f80353b4b1f43e4da9a53f1370488af83bfe7e27a956cff4115231afebd0b982eda4cd74f178deb5ea13c7db0ef4f0246b73b7c2c0e3a705ac17b425867143b133369c3c6bcebe4da8cf6be132303134b228e89efe41d8e27", 0xcc}, {&(0x7f00000014c0)="5a699866ababe22dcd09fb2012bbaeef240d400c04c31f8e86d052cf11c9f5c4ce6aa166dd8b602b96e362e87a02f79c4ed731f4e3ce2697adb47271e76b04c0e3d66cc835c0a313ae4a558d0b89282038173184cd5ccd0e0b78717dac9c50ce0a7b27c97948baaf70ee5e7adc65f2dc83440cf7b452365ad594d34b2e2d7decd8398c948570296e747515f93208ad380f4ff439c402714d113f86d5f0c800", 0x9f}, {&(0x7f0000001580)="c9b21d988357e505ca0a66a06886abbca04ecc38f69d6395fb5b076577f5615bd0ad6cc6a18e1f383e71356cb45d6a60a30bc834157fc0ce4489d2c2104a74be90603b1dadd3ce287a46f9f44fd5dca6c6475604e4675a2c1db45b3aeac66fd80d17e59318f3a2966399cf6e18a2d01c51b5378907ceeb128acd2e9fdd613a33eb1ab77b0a04dcaeb1087f11b798147284c6077b474859f7ff231e3d579601201eed322f0f9aaf55e19168ea62585b78f6a95ee4c2ec1283ee6d8c4461618332ed1102bbf98e0c12147ee68ce29ac7", 0xcf}, {&(0x7f0000001680)="91bc2a183bc71e499c1110315f2619b663c3f748d4beef862fd28a4aac1293ef761e6f892413522f621ee75e2919d63b79be3e2f86ae97e26733f126d109cc446850c0e8a6c0ae8b192cecb41c933f8b4836808a00ec0b9403d43121a34f67e05321fbb29450f2d9a57a4b86d61971b08770cb14c6660e4747916b1a744937eb483707b2392b6f06b8ecf301b904d856c78b3f30869e11f84faf2c22cbf88890d6cc7692880e96a5aff288175fdbb5808f846056e578fee96f6b1c8d51893531d2f3f8361317", 0xc6}, {&(0x7f0000001780)="fa53100028ad97f9713e0d0545dcd9b014fc6aba0534690fc1b8fe7ecde30925b48abcc2f3dea15440128ff60ea301283b33856fc33ef2d5214a805e5fe22548dc51b00569a41d51f1e7c0fc9eaf984c93ae5f09901afc858a5ba5fc472fd7f133936e2018dac8b019321dd47aa05db98a3e20765a9da39746cd4aa8f82c447fb701fca2f8d3468c22ff31d7053b8af10c086ff9298bf4de7f91561fd4383ac281c0095b30e4ed517d907027a94a24e253b35bd5ca5335b3f8bddd544d3bff0f48b4acea3efc5584cc", 0xc9}], 0xa, &(0x7f0000001940)=ANY=[@ANYBLOB="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"], 0x150, 0x20000000}, 0x40000) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000001b40)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'veth1_to_team\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1003.802440] audit: type=1400 audit(1537945341.934:17321): avc: denied { map } for pid=3806 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x46030000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:24 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0xcc) 07:02:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4c00, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4404}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x90, r2, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffffb}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @rand_addr=0xfffffffffffffff8}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xb2ec}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xa022}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xdae}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x804) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x101000, 0x0) clone(0x400002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() seccomp(0x2, 0x0, &(0x7f0000000100)) 07:02:25 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x4, @local, 'ip6_vti0\x00'}}, 0x1e) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0xfffffffffffffffc) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f00000000c0)=0x45, 0x4) 07:02:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4703) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:25 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0xcc) 07:02:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x74, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2c000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:26 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000016c0)={0x0, 0x0, @pic={0x0, 0x40bd, 0x34f, 0x1, 0x9, 0x0, 0x0, 0x80000000, 0x0, 0x9, 0x0, 0x81, 0x8001, 0x20, 0x8, 0x5}}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x5d, &(0x7f0000000080), 0x0) mlockall(0x1) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0)=0x31, 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000240)=0x80) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000040), 0x4) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000640)="97a1f3b024235f02d0ffbfbedc6dbffcbc0b82fa4d80f4e3609739a18c4de43ed33b35da4c45a05f9a527211f6434b8daa4dfbe5759c2044c795526e677170f94f9e189a38be56def29c720032faaa7e11e848a92527fe60fd37091f5bb2ab1224ecd8210730088a4f0ac627317d76e85e8521052786fd5cf06cba87e9efe05ac6c3bd7805d0e40b26fb0fa7c855a499c772333a055a0574b518432fe1b6f5ef9c18a5c8544242c5b19f381fdd69c785c70fde3a02af7984e18192f4ef6ab4653cdfc29bf42d11a36944942e589e779c5d0c9124cb143bc9af2392085b799ab4e2e7fc40f59d3f7dbc068ce833ea482291ee2a0bc9bad0b3e45a91a993d4d6bd31c33735520d00463b732b598bcb9bcaea1a02ba548001d68cfa13dfdef92a43ef931adb74842c58c9edb0f6f4a3c7fa7beba2b17e65a202525af9f3d629c84e06c601197ee4dba27f7bde52c9cb5411895fbbad2fb373f35f5cda9e40f3d69eba4ae862d8c50b08fe9e17dedea059ba22e2d2decf1aad77a39a06920971a28b2fa798ab5806550308420e142fd45b3dc512926002fb71d547b51640ce10de5cf6df83e23c9996c2d63321881d802c728fba1f0d8a3b66edc0e57c93f9c4e5086f1d5cdc0eb806c11d0d872dd1ca8f33d40df8f161996077c8659415108a721cb443c592b96363e8f98f4701b59c755ecefc2b6d8e134c7e3391ca66d01d9320e16d5ddfccf1ca42d5bf42b6bd40596e7f0d3932b03dc34b9768e5b96f7baf53354d74d93aa2a47ec43f106d70e73404cfacf680993e6cf4a07aab84c69b87e4aea2137a27f31da15c0155aabc1177bc3698f688e275d91b022d3986f9dc5fecb37d0fdfd08eb543f31f1bb70c00ef92a93c4535e3cda86c9f383fa32bc2df2cf657bd1f23707947c915acfdd655ff4dd82b8d0e48784b1c995ab076859fceaadcdeadca1e59d96372b9b6483a798fef453e89a9093afa94f9e0537d3bc893505e67dc263e93c5b5f8860dae1070ac438e912283620b14f62dd895711db22456f79185fec246a58673d70c5c6bb5243a8ee87ecbedbfd818013cbf29b8ab8b117773c480afd0d8fd1d6bb0a8cf98a25a30bfa7608f4675acc467b4312071a6964d41a92e5fc1e12d902c963e57e6170d5fc7723fed756c54a257476be60a9b16eccbecec1ed8bc28fa2d63de6f0ebe18d2d9aedc34f7a702fcedabe97e92cea87f6dcd4995e2bb148f2e86c45195a74907b637645fd265423d06fef9b13643de26c317b9ba1025725a502e3447f3bd5a1799093b85c572cca2c30982269fa40513d9440cf2231aca9878ac7a41dab1570a978bdc7e914c38c04d58f73c1017493a2da1626f1543f83211be311d9482b5333146ab41eb0a6850fe191620b3fbdbeb263d7a89b80f1c383cecc44578efea688af188f9331cec3c8917db6d49111a1912caba658381ae4c22c5dca9e51e1acc97814fbb15be98e39affaa6cb4a112778c9cb518950793b94b9585fcafa57aa346330ac8bf38a9922441a7c8c902cc50255a2ba3515e66e3ea58fd085c69691218387aff6a56efbac59334fb032fa08530b87bcdff3a7cc13ea3682ad8004eb6b9a07d86592d537c75e8f53f00e8dd977b8f720704502a814e746ee1e53b138a1c43b0f82605c6ec05d5f4d0ced76cfd2b13302fa267cecdf86dc5939d5bda9e0a622682cb3f1df7d1fea657a1c664d41a775c6a34d43f57db0464f72ba3c1867f63852f1881e33071b4e9f4fdc1780df051691cbb33d47efcfbef6b1f00d407783485f3d5d5a977e9b272641423ccc9155510e1d2978ea5f3d25155fc395759a2bcd3f45f177b8ea09f01a43d367d82a9bebfe281cbb61ff1480f1a18f82fa39a0fffc12d8b356c4fbcb23720059d0b2844f5506d46ab809f80ac5dec0391b4cff147eb7b6a5fa2a31311a9936ee0ddd798e84bd868745b6b6e62cc9d5d5f5f2d9047c143abfee47670c4d9d06e4e905fe8ff3f6786bd7f13b33fdc570e48a409ba7de77458f381c9b95b797cfc27de77096289b44ffff350e345028ee6aa45ab084727d6a463bc78e1ec586246db486c53f8083de0cf4c7e954f3bfeebcd1a0c7fd72ed076124656d5b59b3b0ac9859d391e95558adb335ea6fbddb157d912162cd62e8e87d597877f218e102514ad4b8427a90e9f6d212364f44c156b2d6454f1d3a22e0b57dbfeea0e616c467384fb042be937584a8c4cd2bd9527f269aec855ffabecea1bb5380769c316f4e356e01599b7d04ac4715814022a270b6e27fdb13d296c598335977beef66f071da47f8957ca6d2ab782687fbdf7c7ae3b785e2653fe09714b0e5a15da166db0d5ebfce2a9dcc8d6654979fc6c747e4a1194c36ab0bf781119e2c0bb7c09df245f6efe355dce46da3cdddac7c1b7e2e50f3f17f109cce0a40ac58684df48312e6cdafe26d546625366a160e10bc458b1fd94e8eada5136915d443474d55023db8348aa7e86dc7efbf860bac5b69bd64e95e6c84e31449a1b77e1085376cab41e540425465b78965c54ce054d12bfe9eac41f107107f3e92b973f20c9bb96137a4048dcb05c08776e6332e062e13a042eccf3e88134436a1a89bb4136c6ba57a0ff5a003171badec16818b0287388c3eafb5c8b66086e8c7ac1ae24cb78164df4d4837c0e9210c1fbff7607e8d0ea2fc661c060537eb6e2e8b957216924fa2d4430e4361e08d4cac0903d576a30f20e9d5370fbfba4d668fd42b4062c348d7a1c563ad8b9bb1d062491b8636d19680d71d92e5f4620d939a57ddff1eb705525c3c2e6d8003ce13454007634e9517da5918e996b46e719f16038dc1224badc32a7415d7ce82942d7f41071f773512d5f6c808c032766fb34717cc21a153f3297fd2d0cef2bd7e5949a0ec7c54d5605b05e63000c6c6e311df918cdaff1a57506c4323072087a44d3b87716d46f04b982e0954dc7b3df2d7f89b4b90796fd1d44ceb36a2c061689ce464ee8623d13781231b21686d660ff41b459f097d2b683add89746e1b20f170ef99be41219178e827b59287550b0c11b18d7fd61164a3d31a34b5dc58c3cb60f2c750529dfff4bed97f3f93935c9f5bee675c945c02d46e7f2f4348595b375202d6f9bc808565b98e84354eb16e3287689592933516388702a1558b7b6108e03f028e55fafe23703603b210d2bff465280635b8c0e00bf2d7b7c8b7c1423b0f057a9b2d87f983927443b04c82ca7a253f0d6d12d737d3051beda7fc261f6add5714f5689dccd2118a63d45fef8f7b78a9f60954ca49587341d396226e2b3d085849b78aebbb5fe2604591b1b4d59b1d631fcac8aaac0289505293fcb4e905d2877ea6f7fbd31d46bd9b47cb85d4bb1a44627563bd807c8966735d75ce14ff65c96825e3eaa92a06e72f7a7b8e8a5f843a639bbaecdb02a08c3c436d9d258272f7e4bb86042504f6bfe9634def9d0a7d198e8b73cf09a57ebedf2f32aaaf0a8b727fe26f1b849f130e24e7f9a8e043fefe1db9467401ea4506d6cc0627e26a42375006112043c934ed1ea76ab366df376bd47494f83aa107c3445713f1500c906e3bdbbc5bc010f5c81eb788621eb8bae330bb0de0c0d12557d7e14bd834aadc6e5a93a3e46dc8aa22aec39c5e33a2f5352504042fa31f3e5db8d15453ada2b0c8a15947e9d223b19c3b6a4a80efba530bd61ad9d6998e8a56761d503458f31a5e6a2f420dcd71f9415912c663249c4cfa43a0485bef0c9d299e6a4a78f43e04cb30deca491deb827fa674244cb136df074643250e31f9965a1a26ab0322d79b1bbbc0d2bb387320b9d108be9b8ffd7b1e438534e5e60941d1e68c23af5829eed1f814af45068ac889e0378c98ba9315d101895f8a83cf7c9c8292f32aaa512398ac6eeae7ecea120aa96e210133f41bcfb7361775d416d369a2faf03e8ec7d20ecc271294fcf97a76f2d7ea7080bbeaf7cac027cf303e80151b5700e3a960bb91eced3b83468a5fb99d26a2ba0abc0371f0edd8ba2ce4cb5b883a4f0d6713e1f7b38b0ef2432355420fc9a4144812dac6fe5a1a37e5c4fb7954e33b9cbbeecfcda6f392d35a2bf2ce16c2902abe7e2227cb7cf689d0c29dd6e94548e5ddf1f351ffbc4e052e008700fdee49c9e46cd7fad495a913a1912d5605c8d24f89b98f18bed12ee06e2469dbfbcbdb709e403aaad6747b7ebdb1c3735dcdcda7a16284f9b53b7118032cc6ed29a202086a727e51576bc23fc18ff13be76605a188205c8df6f563f8a48ab69c170e118d8a3e8b8724674bc5ea9d764e4e06fb4693b6fc008b3d3a4c7acac6ccdce0da9d38fbd1508a4ff61c3a6bb859962572897b0c3e6aea29dbbc5e434cb50d150ff127985ed95b23614d7d9b913675934e85145cf36388121e1c7351d1ea02f2fda5ec9e8fb67c488339935ae6999923bb0410e87106a2bab5ea48db9d1a20ed554a4576c1f088a4d463a47f83dabf62aad4c58adc8ccb6f6154428af54caa85938c88c3271865f3dbe1246c5e3fe25241f77ca53589441c7f7b37632d68c05059b209ecc5652398a7c86ee88aefe95bf03463b89e94ca287238f0b7031c961430f233ee6cd899fd976014a0465547641b06466f3dbf2021a4e01b43ff97a00ba2b6e86727a2c12bf3a5f24ae4c0c2c2014455154a3758071284390b5747570ca28b441ec53f85b0231045bcacbd49009022c727ddc9753994fca6f2f5989122ce3d1c90dd3fe439a45f8bdaefcf48004fba424b310b38361b5e378fa64a9496a48289301cbaa9af87e22356cb74d4f3217c7dbead5bed8edd70331dd1d96173a44bcffbe03bc6ca79e618d8f0a86131c0feab0118aeedc4382afe042910f1521cb580d90cdd7a94298e491dd67d76e9930a907abadaa364f61f1479ae6e0986669a0a476c23d36e54654032dc824bfbed15a0c9aa7c68c66c01f451b691a28976bea295d06a11c0a2430b8e9dfc61defa0ee427405c84d802b560aba14433813e0f732e6a0244d945468148aa0560824b3c70777fd683f00c61ca6c16d08c9e32af848fc020abc385d045fc8ea51514a443fdc9088a7af6c8263d0ca9d65f5b08fa95357935254769568ca83edd0e96d4466d791ed435483258ea326706dd598dc9e8ddd2557283fbf5ebaddde4418fed38398530a7e7d3ebf2bcfa139855bf806a784f1f279be3ab07ebfb67680ee3fd1f57fe56ca659286d839558dfdcd7122e89709da63d24f01a5c69f3aaea44fe73102844c94ef88b0ace01b07d960649f7f991021372326ae997a0b033791c49a77728b4e0ede89489d40dd4cfd7fa146329c72ca23214d3a1081782c66044d5e4c497f129bd97324e4ddf0cb3882055b82d21b4fb65050c92711ceeb83a67578aaa4a8a7be2ec4448ca9bea16a55ba44551945dc937f2bb86b4a454c002c8cd2a66823249a491dfc7687491914c95606e8326a91a2880256ecc68361e13a7a515f69d2f4a966da2784aa8c3fded8a15dccbd852bd00038ee3493df0329c8eeadd2ef33152a6c8508350132f524f0f41b21470eb4c6680af431bf69a76ca8e5d257925618846120e0520ad193f89acd1119a0353e3af409f202a31924d5fe0d2b7533c81502a9ed9d49356cd9cf4558c270712f4ee634677ad3f3bb9fdcdc91e10d3e367c1eb600a6e1a74be474ab36005a7352c714d9587f51764185be3f3", 0xfc0) connect$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x6, 0x6, @dev={[], 0x11}}, 0x14) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x0, 0x2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000440)={'syz1'}, 0x12000) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000003c0)) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) r5 = openat(r3, &(0x7f0000000100)='./file0\x00', 0x200, 0x1d1) setsockopt$inet_tcp_int(r5, 0x6, 0x0, &(0x7f0000000140)=0x401, 0x4) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f00000000c0), 0x4) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x28, &(0x7f00000017c0)="0236136766f9688f7177b37919d4596eb9463ebe11f94e75d03d2b4c234b632eacbe78b15c20c0b122f130826b94a57fab0d0be6039b69ad63c3e99082c7b570693f684da5a1e84273495d60525565cc3ed316035415bed465aded3ac3f22f73689a905de0c56f89019b31004a1aec0027b279ed7618f4fae4cc0d0197eeef42c71aca18723c1cd08164514cd68b92d31f658cba7b2f22b7c31885a9e16ee3e3ee6a20ec7160a6c488e1f3afae6dffdbb555d5dfb6bd361b8a930c788e882df86217172516cdb3bc1d7091375aaf41185c5d09f5670ea99331b8b629aef7176ca74cab8cf58fdd48170b5b96115344a994c1b9a0e466014517726d6768e75ba21b8ba7014e6e33fd968c48fb84a45a186ff0ddaf187c12eff55f1e413bf324ce136a33eda0d7dccf21cd4128999b84b8d8247d60f19b01e495ed285ead2ccc308087b590e6ec6056e2266e06bcb621b2281ff2ffe450e2cb4159180408ff9aa8f1c2a5fefde546e5fad079c101a182c7c1f4e410fa54300b014d77a4dbda5bfd7649a0642700c31768f1c65f355f21065d98e9813b264eb8b44490f5ce01508177c03ed27a80ec34ad8d9503a237e6704903f1e75dbe9f3746f579", 0x1bb) [ 1006.960751] kauditd_printk_skb: 146 callbacks suppressed [ 1006.960769] audit: type=1400 audit(1537945346.684:17468): avc: denied { map } for pid=3872 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1007.140049] audit: type=1400 audit(1537945346.744:17469): avc: denied { map } for pid=3872 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1007.336135] audit: type=1400 audit(1537945346.814:17470): avc: denied { map } for pid=3872 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:27 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0xcc) [ 1007.546290] audit: type=1400 audit(1537945346.844:17471): avc: denied { map } for pid=3872 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4ad, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1007.729245] audit: type=1400 audit(1537945346.964:17472): avc: denied { map } for pid=3872 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1007.900457] audit: type=1400 audit(1537945346.984:17473): avc: denied { map } for pid=3872 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:27 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$TCXONC(r2, 0x540a, 0xfffffffffffffffb) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x600000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1008.204043] audit: type=1400 audit(1537945347.054:17474): avc: denied { map } for pid=3884 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.383405] audit: type=1400 audit(1537945347.064:17475): avc: denied { map } for pid=3884 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.584223] audit: type=1400 audit(1537945347.094:17476): avc: denied { map_create } for pid=3883 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:02:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1008.735914] audit: type=1400 audit(1537945347.114:17477): avc: denied { map } for pid=3884 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:28 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0xcc) 07:02:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:29 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x202, 0x100ffd) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)=@delqdisc={0x110, 0x25, 0x0, 0x70bd29, 0x25dfdbfe, {0x0, r1, {0xf, 0xf}, {0x2, 0xfff6}, {0x2, 0x1f}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x31}, @TCA_STAB={0xac, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0xbd, 0x40, 0x7, 0x20, 0x2, 0x6, 0x100000001, 0x7}}, @TCA_STAB_DATA={0x18, 0x2, [0x7, 0x100000, 0x100, 0x2, 0x401, 0x5, 0x3, 0x100000000, 0x8]}, @TCA_STAB_DATA={0x10, 0x2, [0x3, 0x7bd, 0x0, 0x1f, 0x7b, 0x7ff]}, @TCA_STAB_BASE={0x1c, 0x1, {0x100, 0x45949537, 0x3, 0x3, 0x3, 0x1000, 0x20, 0x6}}, @TCA_STAB_DATA={0x8, 0x2, [0x9f]}, @TCA_STAB_DATA={0xc, 0x2, [0xffffffff, 0xffffffffffffffc1, 0x3, 0xfffffffffffffffe]}, @TCA_STAB_DATA={0x18, 0x2, [0x1, 0xc3, 0x9, 0x7, 0x8, 0x6, 0x81, 0x81, 0x1]}, @TCA_STAB_BASE={0x1c, 0x1, {0x0, 0x1, 0x7, 0x800, 0x1, 0x8, 0x10001}}]}, @TCA_STAB={0x38, 0x8, [@TCA_STAB_DATA={0x18, 0x2, [0x1, 0x2, 0xffff, 0xfff, 0x100000000, 0x1, 0x8, 0x3, 0x101]}, @TCA_STAB_BASE={0x1c, 0x1, {0x3, 0x28, 0x401, 0x2, 0x2, 0x400, 0x3, 0x5}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x800}, 0x8800) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x726f757000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1010.613960] XFS (loop5): Invalid superblock magic number 07:02:30 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0xcc) 07:02:30 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = getpid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x4908, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7f, 0x9, 0x1ff, 0x2, 0x0, 0x2, 0x9, 0x1, 0x4, 0xb37, 0xffff, 0x100000000, 0x0, 0x7, 0x4fea, 0x1f, 0x7fff, 0x1, 0x100000000, 0x80000000, 0xf6, 0x10001, 0x7, 0x417, 0x80, 0x3, 0x7, 0x80000000, 0x100, 0x6, 0x1f, 0x7fff, 0x100000000, 0x81, 0x1000, 0x1ff, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0xa}, 0x4, 0x3f, 0x8, 0x7, 0xfffffffffffff801, 0x8000, 0x3f}, r1, 0x2, r2, 0xb) sched_getaffinity(r1, 0x8, &(0x7f0000000140)) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'n\x00'}}, 0x1e) [ 1012.008704] kauditd_printk_skb: 118 callbacks suppressed [ 1012.008721] audit: type=1400 audit(1537945351.734:17596): avc: denied { map } for pid=3949 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.220596] audit: type=1400 audit(1537945351.734:17597): avc: denied { map } for pid=3949 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.392916] audit: type=1400 audit(1537945351.824:17598): avc: denied { map } for pid=3952 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.503317] audit: type=1400 audit(1537945351.824:17599): avc: denied { map } for pid=3952 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.704224] audit: type=1400 audit(1537945351.874:17600): avc: denied { map } for pid=3956 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.824341] audit: type=1400 audit(1537945351.884:17601): avc: denied { map } for pid=3956 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.846583] audit: type=1400 audit(1537945351.894:17602): avc: denied { map } for pid=3956 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.977992] audit: type=1400 audit(1537945351.904:17603): avc: denied { map } for pid=3956 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.154275] audit: type=1400 audit(1537945351.904:17604): avc: denied { map } for pid=3952 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.364310] audit: type=1400 audit(1537945351.984:17605): avc: denied { map } for pid=3956 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:35 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="7b1af8ff0000007675e0140069a2f8ff00000000bf200000000000009553fd2ed5774c4742ba523467c4820b77986258d4d6a1e0e39f0c25d14710312c32ab5ec279418e356ecfd5c8e754e3d5be388f4c4b73832b8959b540a615cdbea274b59c05cebfd3b50dd3a5fd8fbc1cd4edaf0f4f03fdf777be8f0bcfa50fbf2cec88396acd4e9c4d5fe73286c83918d1fd216e5fb031f1646614b8e12154ab10ad7aba129283767bf60d0930"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) recvmmsg(r0, &(0x7f0000001880)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/3, 0x3}, {&(0x7f0000000500)=""/38, 0x26}], 0x2, 0x0, 0x0, 0x100000001}, 0x20}, {{&(0x7f0000000580)=@nl=@unspec, 0x80, &(0x7f0000000840)=[{&(0x7f0000000600)=""/36, 0x24}, {&(0x7f0000000640)=""/141, 0x8d}, {&(0x7f0000000700)=""/204, 0xcc}, {&(0x7f0000000800)=""/6, 0x6}], 0x4, &(0x7f0000000880)=""/217, 0xd9, 0x377aef4a}, 0xe2c4}, {{&(0x7f0000000980)=@hci, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000a00)=""/36, 0x24}], 0x1, &(0x7f0000000a80)=""/112, 0x70, 0x8000}, 0x100000000}, {{&(0x7f0000000b00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000bc0)=""/46, 0x2e, 0xf9}, 0x2}, {{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c00)=""/168, 0xa8}, {&(0x7f0000000cc0)=""/180, 0xb4}, {&(0x7f0000000d80)=""/48, 0x30}, {&(0x7f0000000dc0)=""/4, 0x4}, {&(0x7f0000000e00)=""/213, 0xd5}, {&(0x7f0000000f00)=""/252, 0xfc}, {&(0x7f0000001040)=""/46, 0x2e}, {&(0x7f0000001080)=""/51, 0x33}, {&(0x7f00000010c0)=""/32, 0x20}], 0x9, &(0x7f00000011c0)=""/207, 0xcf, 0x2}, 0x80000001}, {{&(0x7f00000012c0)=@pppol2tpin6, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001340)=""/184, 0xb8}, {&(0x7f0000001400)=""/22, 0x16}, {&(0x7f0000001440)=""/141, 0x8d}, {&(0x7f0000001500)=""/53, 0x35}, {&(0x7f0000001540)=""/171, 0xab}, {&(0x7f0000001600)=""/26, 0x1a}, {&(0x7f0000001640)=""/38, 0x26}, {&(0x7f0000001680)=""/110, 0x6e}, {&(0x7f0000001700)=""/137, 0x89}], 0x9, &(0x7f0000002380)=""/4096, 0x1000, 0x40}, 0x6}], 0x6, 0x140, &(0x7f0000001a00)={0x77359400}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x100, 0x0) write$input_event(r2, &(0x7f0000000240)={{}, 0xdd4eda586ac7c12a, 0x3, 0x5e2}, 0x18) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x100) bind$nfc_llcp(r3, &(0x7f0000000180)={0x27, 0x0, 0x0, 0x7, 0x8, 0xfffffffffffffffa, "797ee8847d7f36aaca00e8a91cbbe0354b6b49c45632f8f8f245395168729f9ba831a12c1987013556c5fc6c77ba06eda646458e7828b20da005c7b4187890", 0x20}, 0x60) r4 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) r5 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x74}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) io_setup(0xff, &(0x7f0000000280)=0x0) io_pgetevents(r6, 0x7ff, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={0x80}, 0x8}) 07:02:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x390, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6c000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xebffffff) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:35 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200000, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x2, 0x666ff220, 0x7, 0x0, 0x9, 0x0, 0x5, 0x4}, &(0x7f0000000100)={0x7, 0x200, 0xdfb, 0x1, 0x7fff, 0x1f, 0x9}, &(0x7f0000000140)={0x80000000, 0x100000000, 0xec, 0x5, 0x7, 0x2, 0xffffffffffff8001, 0x3}, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={&(0x7f00000001c0)={0xca8}, 0x8}) recvfrom$inet(r1, &(0x7f0000000240)=""/101, 0x65, 0x2002, &(0x7f00000002c0)={0x2, 0x4e21, @remote}, 0x10) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:35 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0xcc) 07:02:35 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0xcc) 07:02:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7f010000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:35 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = shmget(0x2, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000380)=""/212) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) rmdir(&(0x7f0000000140)='./file0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) fcntl$setflags(r0, 0x2, 0x1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x802, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) tgkill(r3, r4, 0x35) [ 1016.293265] XFS (loop5): Invalid superblock magic number 07:02:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8003000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x3f000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1017.018992] kauditd_printk_skb: 158 callbacks suppressed [ 1017.019008] audit: type=1400 audit(1537945356.744:17764): avc: denied { map } for pid=4001 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x500, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1017.273729] audit: type=1400 audit(1537945356.754:17765): avc: denied { map } for pid=4004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.533267] audit: type=1400 audit(1537945356.774:17766): avc: denied { map } for pid=4002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.720472] audit: type=1400 audit(1537945356.784:17767): avc: denied { map } for pid=4004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.869778] audit: type=1400 audit(1537945356.794:17768): avc: denied { map } for pid=4002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000900ff8), &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) r0 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) mq_getsetattr(r0, &(0x7f0000000240), &(0x7f0000000280)) 07:02:37 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xcc) 07:02:37 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x200000, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000140)={0x2, 0x4, 0x3f, 0x7}, 0x10) [ 1018.005120] audit: type=1400 audit(1537945356.824:17769): avc: denied { map } for pid=4004 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1018.189245] audit: type=1400 audit(1537945356.834:17770): avc: denied { map_create } for pid=4000 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1018.358742] audit: type=1400 audit(1537945356.844:17771): avc: denied { map } for pid=4005 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1018.537332] audit: type=1400 audit(1537945356.844:17772): avc: denied { map } for pid=4002 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:38 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0xcc) 07:02:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7f01, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1018.654104] audit: audit_backlog=65 > audit_backlog_limit=64 07:02:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x65746367) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:38 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_NMI(r1, 0xae9a) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1018.792259] XFS (loop5): Invalid superblock magic number 07:02:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb800000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:39 executing program 3: mount(&(0x7f0000001440), &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000300, 0x500000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x3f000000, 0x6]}}) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000110007031dfffd946fc68e0020200a1b02000000010000000c1ba3a20c00ff7e", 0x24}], 0x1}, 0x0) 07:02:39 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x80800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) 07:02:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff03000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:39 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0xcc) [ 1020.603690] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 07:02:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4800) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:40 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, r0+10000000}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x14, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, r1) ptrace$poke(0x8, r1, &(0x7f0000000040), 0x0) ptrace$getsig(0x4202, r1, 0x0, &(0x7f00000001c0)) 07:02:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3801000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:40 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xcc) 07:02:40 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x8, 0x1, 0x5, 0x6, 0x5}, &(0x7f0000000100)=0x14) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0xc3, 0x30}, 0xc) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0xfffffe79) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x6000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet6(r0, &(0x7f0000000000), 0x1c) [ 1022.090335] kauditd_printk_skb: 187 callbacks suppressed [ 1022.090352] audit: type=1400 audit(1537945361.794:17958): avc: denied { map_create } for pid=4096 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:02:41 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0xcc) 07:02:42 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1022.309091] audit: type=1400 audit(1537945361.844:17959): avc: denied { map } for pid=4088 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.529375] audit: type=1400 audit(1537945361.874:17960): avc: denied { map } for pid=4097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x8000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x138, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1022.834278] audit: type=1400 audit(1537945361.874:17961): avc: denied { map } for pid=4088 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x700) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1023.014267] audit: type=1400 audit(1537945361.904:17962): avc: denied { map } for pid=4097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1023.204446] audit: type=1400 audit(1537945361.934:17963): avc: denied { map } for pid=4097 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1023.411698] audit: type=1400 audit(1537945361.934:17964): avc: denied { map } for pid=4106 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1023.599135] audit: type=1400 audit(1537945361.944:17965): avc: denied { map } for pid=4104 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:43 executing program 3: creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='\n27.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)={'trans=tcp,', {'port'}}) 07:02:43 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0xcc) [ 1023.803996] audit: type=1400 audit(1537945361.954:17967): avc: denied { map } for pid=4106 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:43 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x6d4727c0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x40000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1023.939732] audit: type=1400 audit(1537945361.954:17966): avc: denied { map } for pid=4104 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.388295] XFS (loop5): Invalid superblock magic number 07:02:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1024.731661] 9pnet: p9_fd_create_tcp (4146): problem connecting socket to [ 1024.731661] 27.0.0.1 [ 1024.849985] 9pnet: p9_fd_create_tcp (4147): problem connecting socket to [ 1024.849985] 27.0.0.1 07:02:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f00000000c0)={0x10, 0xf}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x22, 0x301, 0x0, 0x0, {0x3006}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000009100)=ANY=[], &(0x7f0000009140)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast2, @remote}, 0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x147, "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"}, &(0x7f0000000380)=0x14f) 07:02:44 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0xcc) 07:02:44 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'os2.', '/dev/sequencer2\x00'}, &(0x7f00000001c0)=""/4096, 0x1000) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x200000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='syz_tun\x00', r2}, 0x10) connect$pppoe(r1, &(0x7f0000001200)={0x18, 0x0, {0x3, @dev={[], 0x21}, 'gretap0\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) write$UHID_GET_REPORT_REPLY(r2, &(0x7f00000011c0)={0xa, 0x7, 0x4, 0x1f}, 0xa) 07:02:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x5) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7a00, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:46 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0xcc) 07:02:46 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = msgget(0x3, 0x102) connect$pppoe(r1, &(0x7f0000000280)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e) msgrcv(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000e1a005df8a0000000000000000000030ee7a940015cce2c700000000000000000000200000000000edacdda8646904b50000100000000000000000000000000000000000000000000000792b0bb16b13d67cbcc9282725e73c9d596523bd4ac003c7368896720ae422b2ae536eb552e3e39db613722944804eb249bfe9e333fbc9998d357342ae2e3d60b3758295eeb0ed96f9f895c274e41ed4d238d394555e9efd9d63bce803e9d858b506f6279f4df9793824dec0cd09b323f531b833646271c83af4b24663c6980495966f8d9e1a4f9605e629b66d618f04"], 0x4d, 0x3, 0x3800) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0xffffffffffffff34) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x557, 0x40) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) sysfs$2(0x2, 0x7, &(0x7f00000002c0)=""/217) 07:02:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{}, {r0}], 0x2, 0x0) 07:02:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x8, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1027.130606] kauditd_printk_skb: 168 callbacks suppressed [ 1027.130624] audit: type=1400 audit(1537945366.854:18136): avc: denied { map } for pid=4184 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1027.342038] audit: type=1400 audit(1537945366.904:18137): avc: denied { map } for pid=4184 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:47 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1ed) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 1027.568879] audit: type=1400 audit(1537945366.984:18138): avc: denied { map } for pid=4184 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:47 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0xcc) 07:02:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:47 executing program 3: [ 1027.840861] audit: type=1400 audit(1537945367.024:18139): avc: denied { map } for pid=4184 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1028.004376] audit: type=1400 audit(1537945367.154:18140): avc: denied { map_create } for pid=4187 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:02:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1028.205943] audit: type=1400 audit(1537945367.224:18141): avc: denied { map_create } for pid=4187 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1028.429864] audit: type=1400 audit(1537945367.254:18142): avc: denied { map } for pid=4191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1028.585512] audit: type=1400 audit(1537945367.274:18143): avc: denied { map } for pid=4191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1028.782941] audit: type=1400 audit(1537945367.334:18144): avc: denied { map } for pid=4191 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:48 executing program 3: 07:02:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000100)=0x100000000, &(0x7f0000000140)=0x4) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) pwritev(r0, &(0x7f00000014c0)=[{&(0x7f0000000180)="93434ccb539a4f8c76c33cdc8e9670d87f0117493998fddac4b12878750f8ce2e2c70cdb1eadc0bd818bc5ec0935701c10008242ace181320d782d6ee2f2f51c993d5a9aa21185b78a16b771453c7d104009304d6642210f5fc252ee89d9e7fd05a03841ef585c05749dcfb870e87fa2dd3f1eff754a66", 0x77}, {&(0x7f0000000200)="ad3e3e27d8858f81748d4ba44b0e0d5e8ab96e9c1b79d7da607577bbc8e8c34047a0664ee96980843d3c632ff8cb01438578d77b1a5705429d26b7df0300be55c3e8af45ae9c85c8a47496914fd9de7da34c30a98a677153393ff712567309857f34c148b5404128e9fc48873f23ad5b4f23f8702c784716995a117b8f4b255ee94f019f3acdc88daf5d88ea31aa753824ef0b024a14e097f8b8f7eb8f3982b7ea2dea26db5346684d9ff76986786fc4c7f55a3d7db2d85e4138e6cf19d393fe488e15", 0xc3}, {&(0x7f0000000300)="58ad59e8656a2c4136d4afb60555fcda3e4cebae095764689a28cccbe46e80fd5ef252f0364a751cd9f9508762cb88163b6553aec485470df20b96c74d335c64c1b11256d309a0c5134c6110fa272bc25de7367b837244", 0x57}, {&(0x7f0000000380)="96af972e69242cfbd0922daa202a598b7b3b53acb2af018519d3acf0ce131a98486ba28de97ce70aaaa620b4f5be25b6b982f4351ada7c79344323e897084f1dfc9a54441b5776f00eed18ecfef85c818a9340f3a6a31e779a0470d3caad6aac6e40599c6fcb33f7ce84f24c44432aa7b30716853d5b8fd966cd892f4162edd40aaf8bd66f6e", 0x86}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="29d438899f778cd7f70c2fc6ea099aeacbcac7481e3e4c37a53b8465d931d28176192412d688fa789e77ead6d86c34d169f086b7d9dc1a85b425c248f1957dd5ea470cb129", 0x45}], 0x6, 0x14) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) clock_getres(0x0, &(0x7f0000000080)) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1028.940600] audit: audit_backlog=66 > audit_backlog_limit=64 07:02:48 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0xcc) 07:02:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4000000000000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:49 executing program 3: 07:02:49 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4703000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:50 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0xcc) 07:02:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x1000000, 0x0, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:50 executing program 3: 07:02:51 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:51 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0xcc) 07:02:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6c00, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:52 executing program 3: [ 1032.388201] kauditd_printk_skb: 195 callbacks suppressed [ 1032.388217] audit: type=1400 audit(1537945372.114:18338): avc: denied { map } for pid=4272 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf00, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4800000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1032.595232] audit: type=1400 audit(1537945372.174:18339): avc: denied { map } for pid=4272 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:52 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x100, 0x0) r2 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)={0x4, 0x7, 0x2, 0x0, 0x0, [{r1}, {r2, 0x0, 0x9}]}) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r3, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1032.762739] audit: type=1400 audit(1537945372.194:18340): avc: denied { map } for pid=4277 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.896945] audit: type=1400 audit(1537945372.214:18341): avc: denied { map } for pid=4271 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:52 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0xcc) [ 1033.070197] audit: type=1400 audit(1537945372.214:18343): avc: denied { map } for pid=4272 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4703, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1033.272766] audit: type=1400 audit(1537945372.214:18342): avc: denied { map } for pid=4277 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:53 executing program 3: [ 1033.424264] audit: type=1400 audit(1537945372.244:18344): avc: denied { map } for pid=4272 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1033.588037] audit: type=1400 audit(1537945372.254:18345): avc: denied { map } for pid=4276 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1033.763372] audit: type=1400 audit(1537945372.254:18346): avc: denied { map } for pid=4276 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1033.925071] audit: type=1400 audit(1537945372.254:18347): avc: denied { map } for pid=4277 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:53 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) fcntl$setsig(r1, 0xa, 0x34) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000100)={0xffffffffffffffff}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000180)={0x3, 0x4, 0x8000, 0x8, 0x0, 0x0, 0x17f, 0x8, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000200)={r5, 0x5d, "ffaa39c0f895f644587e130b2d55bc6347940e1fefc6d261a705b6d3b9b8169d18f8e4be0ea252474981d59dcfeff95512384fb393c5369b20c2166daee94bcc716fb382e33c33528cfcf34bc458b1d239d3e1b81f71078f14c480078a"}, &(0x7f0000000280)=0x65) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:54 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0xcc) 07:02:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6c, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:54 executing program 3: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) write$selinux_access(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='~ystem_u:object_r:etc_t:s0 /usr/sbin/ntpd 00000000000000000000\x00'], 0x3f) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)) getpid() r1 = getpid() getpgrp(r1) 07:02:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x5000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:02:55 executing program 0: socket$pppoe(0x18, 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000000c0)=""/203) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:55 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0xcc) 07:02:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x600000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:55 executing program 3: lremovexattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)=@random={'system.', '*cgroupmd5sum\x00'}) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) mknod(&(0x7f00000000c0)='./bus/file0\x00', 0x3, 0x9) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f00000002c0)) 07:02:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa8, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:02:56 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x121000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000000c0)) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:56 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0xcc) 07:02:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa00000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1037.416227] kauditd_printk_skb: 191 callbacks suppressed [ 1037.416242] audit: type=1400 audit(1537945377.144:18539): avc: denied { map } for pid=4351 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f00000000c0)={0x10, 0xf}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x22, 0x301, 0x0, 0x0, {0x3006}}, 0x14}}, 0x0) [ 1037.631590] audit: type=1400 audit(1537945377.184:18540): avc: denied { map } for pid=4351 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.794801] XFS (loop5): Invalid superblock magic number [ 1037.864339] audit: type=1400 audit(1537945377.224:18541): avc: denied { map } for pid=4350 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:57 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1\x00', {0x2, 0x4e24, @local}}) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x3, @broadcast, "73797ab974756e0000000000000200"}}, 0x1e) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x210002, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) 07:02:57 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}, 0xcc) [ 1038.061436] audit: type=1400 audit(1537945377.274:18542): avc: denied { map } for pid=4351 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x68000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc7b, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1038.226658] audit: type=1400 audit(1537945377.274:18543): avc: denied { map } for pid=4351 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1038.410823] audit: type=1400 audit(1537945377.424:18544): avc: denied { map } for pid=4351 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1038.624244] audit: type=1400 audit(1537945377.434:18545): avc: denied { map } for pid=4351 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe101) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1038.782135] audit: type=1400 audit(1537945377.514:18546): avc: denied { map } for pid=4358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1038.961533] audit: type=1400 audit(1537945377.534:18547): avc: denied { map } for pid=4358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1039.190428] audit: type=1400 audit(1537945377.584:18549): avc: denied { map } for pid=4368 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:02:58 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:02:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = gettid() ptrace$getregs(0xc, r2, 0x7f, &(0x7f0000000080)=""/127) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:02:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x48000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:02:59 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}, 0xcc) [ 1039.977428] XFS (loop5): Invalid superblock magic number 07:02:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:00 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:00 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @random="9cd885986a25", 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8001, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000004c0)={0x0, 0xacb, 0x30}, &(0x7f0000000500)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000540)={r3, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x400, 0x3}, 0x90) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000000c0)) 07:03:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7a00, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:00 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0xcc) 07:03:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6c) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x8004, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:01 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x1000000000000000) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'ip_vti\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:01 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0xcc) 07:03:01 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1a, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1042.428637] kauditd_printk_skb: 168 callbacks suppressed [ 1042.428653] audit: type=1400 audit(1537945382.154:18717): avc: denied { map } for pid=4443 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.656751] audit: type=1400 audit(1537945382.244:18718): avc: denied { map } for pid=4443 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.847449] audit: type=1400 audit(1537945382.254:18719): avc: denied { map } for pid=4450 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:02 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x101200, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) [ 1043.019592] audit: type=1400 audit(1537945382.274:18721): avc: denied { map } for pid=4443 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff00, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7a) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1043.243572] audit: type=1400 audit(1537945382.254:18720): avc: denied { map } for pid=4450 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1043.392548] audit: type=1400 audit(1537945382.304:18722): avc: denied { map } for pid=4450 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:03 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}, 0xcc) [ 1043.557431] XFS (loop5): Invalid superblock magic number [ 1043.585425] audit: type=1400 audit(1537945382.324:18723): avc: denied { map } for pid=4450 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:03 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1043.764706] audit: type=1400 audit(1537945382.374:18724): avc: denied { map } for pid=4451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa002, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1043.917556] audit: type=1400 audit(1537945382.414:18725): avc: denied { map } for pid=4450 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1044.044341] audit: type=1400 audit(1537945382.414:18726): avc: denied { map } for pid=4451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:03 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x5, 0x2000) getdents(r2, &(0x7f00000000c0)=""/83, 0x53) 07:03:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7400000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:04 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0xcc) 07:03:04 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:05 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) sendto(r1, &(0x7f0000000140)="1ad2901b86037de75f1de129f88bd3286b1b3dd1da925c2fecc929f5eb97ec0d0ace403df2d9c9476a89038af6f68b22fd82cf7ced2b60d34f482fcefbc907fa93f6f390f0fe330fc146d4fe9d3c65cd6c01d11862d0dccd9c58a007be86f523f5ffb603c72bdb8235e9cafcaedfe534f51292ebd30cf89dfb8ce12673367eb76e30e0814e4c6c2161acaef57fc13b82b4cf62c0526e9f8e0cf6eb9e998ef39537d7c5dbcd019e2a161af6d0dfa2863594df26976d56aa8121fcbc59362837e95bf0778ca892ea79bb8e34e6e3", 0xcd, 0x40000, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x3}}, 0x80) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f00000002c0)={"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"}) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000006c0)={@remote, @empty, 0x0}, &(0x7f0000000700)=0xc) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000740)={@empty, @local, @dev={0xfe, 0x80, [], 0xe}, 0x100000000, 0x7f, 0x1, 0x100, 0x6, 0x18a0044, r4}) 07:03:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4ad, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:05 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0xcc) 07:03:06 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) 07:03:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7400000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:06 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x3f00000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:07 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0xcc) [ 1047.439522] XFS (loop5): Invalid superblock magic number [ 1047.459286] kauditd_printk_skb: 166 callbacks suppressed [ 1047.459302] audit: type=1400 audit(1537945387.184:18893): avc: denied { map } for pid=4529 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.628687] audit: type=1400 audit(1537945387.194:18894): avc: denied { map } for pid=4529 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xffffffff00000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x58465342, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:07 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x7, @broadcast, 'veth1\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1047.871740] audit: type=1400 audit(1537945387.224:18895): avc: denied { map } for pid=4536 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1048.053278] audit: type=1400 audit(1537945387.234:18896): avc: denied { map } for pid=4536 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:07 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1048.307728] audit: type=1400 audit(1537945387.254:18897): avc: denied { prog_load } for pid=4534 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:03:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6574636700000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1048.514296] audit: type=1400 audit(1537945387.264:18898): avc: denied { map } for pid=4536 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1048.666891] audit: type=1400 audit(1537945387.274:18899): avc: denied { map } for pid=4530 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:08 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xcc) [ 1048.842898] audit: type=1400 audit(1537945387.284:18900): avc: denied { prog_load } for pid=4534 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1048.981364] audit: type=1400 audit(1537945387.294:18901): avc: denied { map } for pid=4536 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4c000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:08 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x40, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) [ 1049.174509] audit: type=1400 audit(1537945387.294:18902): avc: denied { map } for pid=4530 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:09 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x29, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:09 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0xcc) 07:03:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:10 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'eql\x00', 0xff}) open_by_handle_at(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="1d00000002008dc051a2331165cf4f5c809bf498caa6950ee66e58fc160b852a1a31f3eab4132c027a99b2b0207f049d2b7819989ea579248f34f777be71e41ea2fdccba58fda04c5a2791d4568424e2b918f6124588a1ed9b6e76e90175583d086fbac080733919a28a7f3fd7a9a78a9ccd9a28decfaa5e2df932d4f51bf7142d3be8ab6a64b83d9419ce0ed144965cfc601daa55452a6ad217d5dc0b78acb20b675131bb2d55629aceca1c5369ef3906f88a601c5bda0b6bf34588caf374a84970b0221a99145d9437cbf8909d3d4b91519561d455b9ba94e682600a1fda15795047fa7db6"], 0x200000) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x3, @remote, 'syz_tun\x00'}}, 0x1e) 07:03:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x3000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:10 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:10 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0xcc) [ 1051.056803] XFS (loop5): Invalid superblock magic number 07:03:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff00000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:11 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0xcc) 07:03:11 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x0, @local, 'syz_tun\x00'}}, 0x1e) 07:03:11 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1052.476259] kauditd_printk_skb: 175 callbacks suppressed [ 1052.476277] audit: type=1400 audit(1537945392.204:19078): avc: denied { map } for pid=4624 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.691546] audit: type=1400 audit(1537945392.204:19079): avc: denied { map } for pid=4625 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x700, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x500) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1053.034325] audit: type=1400 audit(1537945392.204:19080): avc: denied { map } for pid=4626 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.214229] audit: type=1400 audit(1537945392.244:19081): avc: denied { map } for pid=4626 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:13 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0xcc) [ 1053.404818] audit: type=1400 audit(1537945392.274:19082): avc: denied { map } for pid=4625 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.558890] audit: type=1400 audit(1537945392.284:19083): avc: denied { map } for pid=4625 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:13 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) bind$packet(r0, &(0x7f0000000140)={0x11, 0x1f, r1, 0x1, 0x400, 0x6, @remote}, 0x14) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1053.764225] audit: type=1400 audit(1537945392.314:19084): avc: denied { map } for pid=4626 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:13 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1053.984259] audit: type=1400 audit(1537945392.314:19086): avc: denied { map } for pid=4624 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1054.104462] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1054.110332] audit: audit_lost=58 audit_rate_limit=0 audit_backlog_limit=64 07:03:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:14 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}, 0xcc) 07:03:14 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r4, 0x401104000000016) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$KVM_GET_PIT2(r6, 0x8070ae9f, &(0x7f0000000240)) 07:03:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x300) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:15 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x8000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:15 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0xcc) [ 1055.860029] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:03:15 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000140)=0x7fff) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000540)="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") r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40000, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000200)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e24, 0x3ff, @dev={0xfe, 0x80, [], 0x16}, 0x90000}}}, {&(0x7f0000000180)=""/40, 0x28}, &(0x7f00000001c0)}, 0xa0) arch_prctl(0x1001, &(0x7f00000002c0)="4eac0876cd9cdbd25076730f35cf8571cda4f62657636b51c9ced3b9414d9e92afc3899392e7b8386a3a0c236469a1dd95") getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast1, @in=@broadcast, 0x4e24, 0xa4, 0x4e21, 0x1ff, 0x2, 0xa0, 0x80, 0x16, 0x0, r4}, {0x54, 0x8b3, 0xfff, 0x40, 0x2, 0x400, 0xfffffffffffffffe, 0x9}, {0xffff, 0x50, 0x8000, 0x6}, 0x5, 0x6e6bb6, 0x1, 0x1, 0x3, 0x3}, {{@in6=@mcast1, 0x4d4, 0xff}, 0xa, @in=@broadcast, 0x3501, 0x7, 0x1, 0x0, 0x7, 0xa000000000, 0x7f}}, 0xe8) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000001540)=0x2) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x288400, 0x8) 07:03:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:16 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4603) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:17 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0xcc) 07:03:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe8010000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1057.532719] kauditd_printk_skb: 192 callbacks suppressed [ 1057.532737] audit: type=1400 audit(1537945397.194:19277): avc: denied { map } for pid=4696 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1057.755397] audit: type=1400 audit(1537945397.254:19278): avc: denied { map } for pid=4701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:17 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x200, 0x141002) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000100)=r1) write$UHID_INPUT2(r1, &(0x7f00000000c0)={0xc, 0x5, "dfd78d2262"}, 0xb) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7a, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1057.914274] audit: type=1400 audit(1537945397.264:19279): avc: denied { map } for pid=4696 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.027486] audit: type=1400 audit(1537945397.304:19280): avc: denied { map } for pid=4701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.173632] audit: type=1400 audit(1537945397.324:19281): avc: denied { map } for pid=4701 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:17 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1058.365827] audit: type=1400 audit(1537945397.344:19282): avc: denied { map } for pid=4701 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:18 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0xcc) [ 1058.533190] audit: type=1400 audit(1537945397.444:19283): avc: denied { map } for pid=4701 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.739049] audit: type=1400 audit(1537945397.474:19284): avc: denied { prog_load } for pid=4702 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1058.954282] audit: type=1400 audit(1537945397.504:19285): avc: denied { prog_load } for pid=4702 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:03:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4800000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:18 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = socket(0x0, 0x803, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f0000000080)=0x404000000000004, 0x4) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r3 = getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) setpgid(r3, r4) r5 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x400, 0x0) ioctl$BLKROSET(r5, 0x125d, &(0x7f0000000100)=0x401) pkey_alloc(0x0, 0x2) [ 1059.161311] audit: type=1400 audit(1537945397.514:19286): avc: denied { map } for pid=4701 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xe8) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:19 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:19 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0xcc) 07:03:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xad04000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:20 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:20 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0xcc) [ 1060.968360] XFS (loop5): Invalid superblock magic number 07:03:21 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x200002) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80800) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf001000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xfffffffe) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x400000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:21 executing program 3: r0 = socket$inet(0x2, 0x0, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:21 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000]}, 0xcc) 07:03:22 executing program 0: clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r2 = geteuid() lstat(&(0x7f0000000300)='\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) rt_sigtimedwait(&(0x7f0000000000)={0x8001}, &(0x7f0000000240), &(0x7f00000002c0)={r0, r1+30000000}, 0x8) socket$pppoe(0x18, 0x1, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) [ 1062.541592] kauditd_printk_skb: 187 callbacks suppressed [ 1062.541608] audit: type=1400 audit(1537945402.264:19474): avc: denied { map } for pid=4786 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1062.724273] audit: type=1400 audit(1537945402.324:19475): avc: denied { map } for pid=4780 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1062.950470] audit: type=1400 audit(1537945402.324:19476): avc: denied { map } for pid=4780 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x347) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1063.154280] audit: type=1400 audit(1537945402.334:19477): avc: denied { map } for pid=4786 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.310855] audit: type=1400 audit(1537945402.334:19478): avc: denied { map } for pid=4786 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4e02000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1063.499937] audit: type=1400 audit(1537945402.394:19479): avc: denied { map } for pid=4786 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:23 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0xcc) [ 1063.624274] audit: type=1400 audit(1537945402.434:19480): avc: denied { map } for pid=4788 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.771460] audit: type=1400 audit(1537945402.434:19481): avc: denied { map } for pid=4788 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.902653] audit: type=1400 audit(1537945402.444:19482): avc: denied { map } for pid=4786 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.039481] audit: type=1400 audit(1537945402.494:19483): avc: denied { map } for pid=4789 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:23 executing program 3: r0 = socket$inet(0x2, 0x0, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x10000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:24 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="a000000063d052288b4504899767f3f1f619e96fe5", @ANYRES16=r3, @ANYBLOB="080028bd7000fedbdf25010000005800030008000800de000000080007004e2100001400020064756d6d793000000000000000000000080003000100000014000600fe8000000000000000000000000000171400020065727370616e3000000000000000000008000500080000002c000200080007000800000008000900010000000800070000000100080002004e2000000800060000000100"], 0xa0}, 0x1, 0x0, 0x0, 0x4080}, 0x24004800) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:24 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0xcc) 07:03:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x7a00000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb8000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x600, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:25 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000080)) bind$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x80, 0x7fff, 0x0, 0xfffffffffffffffd, 0x400, 0x7}}, 0x8) r3 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7, 0x0) epoll_pwait(r3, &(0x7f0000000180)=[{}, {}, {}, {}], 0x4, 0x7ff, &(0x7f00000001c0)={0xffffffffffffff57}, 0x8) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000040)={0x18, 0x0, {0x2, @broadcast, 'syz_tun\x00'}}, 0xfffffffffffffca9) r5 = dup3(r4, r0, 0x80000) openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x0, @broadcast, 'syz_tun\x00'}}, 0xffffffffffffffe9) prctl$void(0x1b) 07:03:25 executing program 3: r0 = socket$inet(0x2, 0x0, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:26 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0xcc) 07:03:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x74, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:26 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:27 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0xcc) 07:03:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x10, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa800, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1067.552994] kauditd_printk_skb: 209 callbacks suppressed [ 1067.553011] audit: type=1400 audit(1537945407.274:19693): avc: denied { map } for pid=4872 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x100000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1067.756757] audit: type=1400 audit(1537945407.274:19694): avc: denied { map } for pid=4865 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1067.906854] audit: type=1400 audit(1537945407.334:19695): avc: denied { map } for pid=4865 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:27 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1068.134306] audit: type=1400 audit(1537945407.354:19696): avc: denied { map } for pid=4865 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1068.292917] audit: type=1400 audit(1537945407.354:19697): avc: denied { map } for pid=4872 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1068.487288] audit: type=1400 audit(1537945407.374:19698): avc: denied { map } for pid=4872 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:28 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}, 0xcc) 07:03:28 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0xfe03) r2 = accept(r0, 0x0, &(0x7f0000000080)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000004ac0)={0x0, 0x0, 0x0}, &(0x7f0000004a00)=0xc) syz_mount_image$iso9660(&(0x7f00000046c0)='iso9660\x00', &(0x7f0000004700)='./file0\x00', 0x4, 0x1, &(0x7f0000004780)=[{&(0x7f0000004740)="bf31fc66879456241689165080f0", 0xe, 0x8}], 0x9000, &(0x7f0000004840)={[{@nocompress='nocompress'}, {@sbsector={'sbsector', 0x3d, 0x4}}, {@map_off='map=off'}, {@norock='norock'}, {@session={'session', 0x3d, 0x60}}, {@block={'block', 0x3d, 0x800}}, {@unhide='unhide'}, {@dmode={'dmode', 0x3d, 0x1}}, {@gid={'gid', 0x3d, r4}}, {@cruft='cruft'}], [{@smackfshat={'smackfshat', 0x3d, 'dummy0\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'syz_tun\x00'}}, {@seclabel='seclabel'}]}) sendmsg$kcm(r2, &(0x7f0000004640)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000000180)="8b748ecda4ce254484fa6bd78a38762e654ecc444b9c31694a2b75c2370525b1b19f64c7fbe229d9c53e3ef1b3666c7c90fe66b98ff645366bcb5a7c6b7289956787a51c5ccf5f2d1eaaeaf5bced1f7aa8d1dc241df0f8c952dca264f93605c2ae16e7533c468dac1d13b7964b247a0e66f4f3f0bcdae5f6bc11f649e82ccb0978699832491228a56d9559dbb1816591fe921a891c46462ecbf45cdfaed41eeaf8c671806687284b1748ee9aa65e39522523c3a8e1b128c9edea52d3d71ee81cc16a46940a2ad7031e96696f7a138aedd3bab97868ee63", 0xd7}, {&(0x7f0000000280)="15b56344bd40db65a9d05514381dd58be6c5913a652d13d74744916eb99c", 0x1e}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="36efe207e944300840ae057d4ab2d399e2761e18fbcdbb2c162e40e4b0433bf57b479b90f6badddb9848ca5577986589c8bc193fd5740b0660224a8569c5f43b81beeefbec9d25f4f2f2820b27d2549a99a65b46702265e349e6165b889d15def709b1ddff61a221587e7d7e683c51b688d8cccfcf9319aaf2acce07c70326786439b96cbc05e1506ca7d8a76cd82e163f9144e87aa499024fce9a540c602f258716507154ad54ea0b2b77b396844599", 0xb0}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="f7fe89cc8de9ab0ef6d74e921bb1e86028c6a34b235f9cf9bf688167953abf428d4fc474fbcafb589fd1ec4d0c49548701d2d91d6511aa0b9baf9fe88c8cfb8fc484f607e985674e67f2a94143eceb91ce8e434e6edcff1fad2e15516f582958c9915adc9f30d138ca87e696234ace26d441ad24599a3ec0ae3318310b4400699d0739545a44943e87fb71f3a835a803e510dc21ff04bbf92a4f727ebad1152d95d7fd4d7faa2fca3d8ecaa15854827753b695dd4dff510559321bbd4e058716c30032d2a65231025d09c18a5928d7a9384db92d03fb183857b59ab688af25f6d5dc9feb157957d74a60d62b2ed434828095bf2f0b10328e40", 0xf9}, {&(0x7f0000002480)="7d87ce2fe1cfd026213087c7ff514e51619ed305fae388da4b03e83a0d93", 0x1e}, {&(0x7f00000024c0)="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", 0x1000}], 0x8, &(0x7f0000003540)=ANY=[@ANYBLOB="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"], 0x10f0, 0x4004000}, 0x44080) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x1f}, 0x9e29, 0x2, 0x3, 0x2, 0x0, 0xfffffffffffffff9, 0x7}, 0x20) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000004a40)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000004a80)={@dev={0xfe, 0x80, [], 0x1b}, r5}, 0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000004940)={@mcast1, r5}, 0x14) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000004680)={0x1, 'dummy0\x00', 0x1}, 0x18) [ 1068.768253] audit: type=1400 audit(1537945407.414:19699): avc: denied { map } for pid=4865 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4c, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1068.960815] audit: type=1400 audit(1537945407.434:19700): avc: denied { map } for pid=4875 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.028420] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1069.062976] audit: audit_lost=59 audit_rate_limit=0 audit_backlog_limit=64 07:03:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x40000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:29 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0xcc) 07:03:29 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_netdev_private(r0, 0x89f6, &(0x7f0000000080)="18e79c90a9f67a5bce101fc05c5e4404d7e7d66ee11c029187d502cd70e3b986239ee0f079192526afab9c1d658a450bd1f6d7d2c94f46f18dd2a7ede2465866d7bec582931dec3f1ae8272a92713bb77ac181c01437b661a576e0d7dad8dd5e286ef300ab8e0cbfdecbdab32d884ea1027f38ddf201ce37b3d2d321542d2bbbd374f46ee7d1e6a62eaefccd04fd97ec2362c87d1bf3632174dd504a1e22379e35b000f21435190e9841bbd5fa96e3402cc3bd2ac9cd") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x10180, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r3 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x200000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000200)={r4, @in={{0x2, 0x4e23, @local}}}, &(0x7f00000002c0)=0x84) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6c000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:29 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:30 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0xcc) 07:03:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x5000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf5ffffff00000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:31 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0xcc) 07:03:31 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:32 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) close(r0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x20) [ 1072.567451] kauditd_printk_skb: 219 callbacks suppressed [ 1072.567467] audit: type=1400 audit(1537945412.294:19913): avc: denied { map } for pid=4953 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1072.792264] audit: type=1400 audit(1537945412.294:19914): avc: denied { map } for pid=4953 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x200000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1072.957865] audit: type=1400 audit(1537945412.294:19915): avc: denied { map } for pid=4953 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1073.190664] audit: type=1400 audit(1537945412.294:19916): avc: denied { map } for pid=4952 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1073.361551] audit: type=1400 audit(1537945412.294:19917): avc: denied { map } for pid=4952 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:33 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0xcc) [ 1073.544307] audit: type=1400 audit(1537945412.294:19918): avc: denied { map } for pid=4952 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x74) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1073.701759] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1073.708793] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1073.758566] audit: audit_lost=62 audit_rate_limit=0 audit_backlog_limit=64 [ 1073.782304] audit: audit_lost=63 audit_rate_limit=0 audit_backlog_limit=64 07:03:33 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={[], 0x1d}, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf001, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xad040000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:34 executing program 3: socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:34 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0xcc) 07:03:35 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) uselib(&(0x7f0000000080)='./file0\x00') 07:03:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:35 executing program 3: socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xffffffff00000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:35 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}, 0xcc) 07:03:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:36 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f00000000c0)=""/67, &(0x7f0000000140)=0x43) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'syz_tun\x00'}}, 0x10) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7f010000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:36 executing program 3: socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:37 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}, 0xcc) [ 1077.584911] kauditd_printk_skb: 228 callbacks suppressed [ 1077.584927] audit: type=1400 audit(1537945417.314:20145): avc: denied { map } for pid=5026 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1077.749031] audit: type=1400 audit(1537945417.374:20146): avc: denied { map } for pid=5026 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xfeffffff00000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1078.001548] audit: type=1400 audit(1537945417.404:20147): avc: denied { map } for pid=5026 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:37 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000100)=0x33) r2 = dup2(r1, r1) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x5) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000080)) 07:03:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1078.233683] audit: type=1400 audit(1537945417.414:20148): avc: denied { map } for pid=5022 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x8, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1078.420237] audit: type=1400 audit(1537945417.444:20149): avc: denied { map } for pid=5022 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:38 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1078.636457] audit: type=1400 audit(1537945417.454:20150): avc: denied { map } for pid=5026 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:38 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0xcc) [ 1078.905100] audit: type=1400 audit(1537945417.464:20151): avc: denied { map } for pid=5026 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1079.074832] audit: type=1400 audit(1537945417.524:20152): avc: denied { map } for pid=5030 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:39 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x4000, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1079.275273] audit: type=1400 audit(1537945417.524:20153): avc: denied { map } for pid=5030 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1079.433181] audit: type=1400 audit(1537945417.634:20154): avc: denied { map } for pid=5030 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x300000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:39 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:39 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0xcc) 07:03:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x8004000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9003, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:40 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000080)=0x400) 07:03:40 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa00, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:40 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xcc) 07:03:41 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x2, 0x0, [0xf5, 0xf4, 0x3d6b, 0x1, 0x1, 0x900000, 0x20, 0x3ff]}) 07:03:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:41 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xcc) 07:03:42 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1082.836565] kauditd_printk_skb: 167 callbacks suppressed [ 1082.836581] audit: type=1400 audit(1537945422.564:20322): avc: denied { map } for pid=5107 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:42 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) signalfd4(r0, &(0x7f0000000040)={0x9c}, 0x8, 0x80000) write$P9_RCREATE(r2, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x10, 0x4, 0x5}}}, 0x18) connect$pppoe(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x0, {0x3, @broadcast, 'syzkaller0\x00'}}, 0x41) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000000)=""/41) mremap(&(0x7f0000ff2000/0xb000)=nil, 0xb000, 0x4000, 0x2, &(0x7f0000ff8000/0x4000)=nil) [ 1082.969947] audit: type=1400 audit(1537945422.564:20323): avc: denied { map } for pid=5106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.110538] audit: type=1400 audit(1537945422.594:20324): avc: denied { map } for pid=5106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:42 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:43 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0xcc) [ 1083.277860] audit: type=1400 audit(1537945422.594:20325): avc: denied { map } for pid=5107 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4c00, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1083.480010] audit: type=1400 audit(1537945422.604:20326): avc: denied { map } for pid=5107 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.656821] audit: type=1400 audit(1537945422.604:20327): avc: denied { map } for pid=5107 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x200000000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1083.873554] audit: type=1400 audit(1537945422.624:20328): avc: denied { map } for pid=5106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b00000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1084.185394] audit: type=1400 audit(1537945422.634:20329): avc: denied { map } for pid=5106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:44 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80, 0x100) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f00000000c0)=0x14, 0x4) r1 = socket$pppoe(0x18, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000100)={0x3, 0x6}) io_setup(0x8, &(0x7f00000001c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) [ 1084.321253] audit: type=1400 audit(1537945422.664:20330): avc: denied { map } for pid=5107 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1084.459224] audit: type=1400 audit(1537945422.754:20331): avc: denied { map } for pid=5110 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:44 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0xcc) 07:03:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4800, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:44 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:03:45 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xc0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x5, &(0x7f0000000500)=[{&(0x7f0000000180)="bfb655e85650d27d3dd59c7987bd7cdc7e5e76c91a523853eef172898b2b0f2d17edb4c648f947b5da6328f71598d702af77abb584fb6d8277441f331c5d3797fbf78286d63635f49ac58c23e209c578", 0x50, 0x4000000000000000}, {&(0x7f0000000200)="2dbc2741d1039fb9b6b370463dc1fc03d7e6ddeb2fc8868b7789b44b5e8ca630e8b86358949f142aa01d75a32955cc6cc3f73d66e005fc10edc300a7c62bf3fa1a7d7ff6990f5399c00fbdff67c46fa412483bb7158912269d82216099b5bc6d03866650fc414182b1c5e77553ed8e578f8847d70a589cb7999e41e6f9e04a3ae2316ff9bc80c1969fbbc608955f3838c7db2ff64995d2e7df8e7bfc35aa62ec03a8308d4f469b115a79c8c35635df9cea0710fc466c0bb5825691dee8853bd46e601e1c227e71782771fea475399d", 0xcf, 0x40}, {&(0x7f0000000300)="7e5c4680a51fccc6e67c0aebd01b24aaa48dfc2b32502e45005af5ea3d74e50e2970a78eeea4f6315375ccc6eed06a7473f0045461834cb28932d5297aa1da312c122e184dcb73e5df2d0e694ec5570b7f6517fc9cf6b16b07b20e0c39bd7cb7ac37ccc1c9ed881b7e210f61b20b792899238b53e3556dbb46d22a482344f5d16cd1b5a3e4599574e829b41ca68d5967fa70064dc385f00b6795d950ec38bceb63aaec8bb2c28a24d24fb5b8806ce875c42c441f1152d128b08bea7482afb9780ebcb0f150e85ce2ca444abdd6f18dfd98b0b0eada91ec7b0fe618f5f2f5fdd041b6c0e03a4df79f958c8c280b0f953bb774", 0xf2, 0x612}, {&(0x7f0000000400)="fd3c971b5314761e5de552ad490547ab10c69b3c309e1511d859326faba8f20f35", 0x21, 0x6}, {&(0x7f0000000440)="ec8fca4925728796f98d349b6412c7f7606be2cccdccfd8a43cb4fc8ea3c0a568cb5713d2413be0039a7b9c8e5f35a285f03a5d60ed642a7415175ceb634ea12691f6ef58a3bcf6b44d0b8733a330e02f7bd884da8a10319272ba23a63c5dee1b2e2249b786e13fb4cc3feab84dd17f365e15c6d5bc615e3e52c18d1f1aebb64d969b5d8c3cbee6df0", 0x89}], 0x200000, &(0x7f0000000640)={[{@disable_sparse_no='disable_sparse=no'}, {@errors_remount='errors=remount-ro'}, {@uid={'uid', 0x3d, r3}}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz_tun\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'syz_tun\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil}) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:45 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0xcc) 07:03:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff03, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xfffff000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9003000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:45 executing program 3: shmget(0xffffffffffffffff, 0x2000, 0x400, &(0x7f0000ffb000/0x2000)=nil) 07:03:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x2, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:46 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r2, &(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, r3) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7fff, 0x20000) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) 07:03:46 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0xcc) 07:03:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0xee00) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f00000000c0)=""/70) [ 1087.844693] kauditd_printk_skb: 195 callbacks suppressed [ 1087.844709] audit: type=1400 audit(1537945427.574:20520): avc: denied { map } for pid=5187 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1088.114282] audit: type=1400 audit(1537945427.614:20521): avc: denied { map } for pid=5188 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xfeffffff) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x347, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:48 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0xcc) [ 1088.394247] audit: type=1400 audit(1537945427.634:20522): avc: denied { map } for pid=5188 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:48 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000140)="7d9c40502debe81f09b443763ae9e17f902a506d257c7c7af6ff9a37242c7300472cca8c5318c213c265fb195bb3601d6398656e5080250ce029dee2e4e2c1fca6eeeedbc27468f2e9919f152a67193f64ff94adce4d988e9c26f42abeb3f565bed8c73b9b6a2f63a93c37983708ab585b8bd5bd8bd2d8272b6cb71094d5991703699aad702a7067a136a516fac318b760b8c092becf77a5c979a7b54b3d6fa0704c347597df22a2eca150129a8608", 0xaf, 0x4}, {&(0x7f0000000200)="c6224ef31fda5982b4ddd658ed77d6dd95e403691d8b5b1f176cf334b0ab63ea30f2d75b37e1f2870b6ef4d978e75ed236d283cee0472a7a9575dba7b6551c31d0273753a2e16a1502145fb66bc142dd5e7add9741fa2b99762e71726a8dc7980ce55ba0cf968ab1083f65e3d79a726c288d41913bcad5393d4b5a7a9c75344628f8a11c41542f173c4cac2de18ae0d7161f9a14c542f4acd9226888babca7bffeabbd385a895235bea6f4d53cb9c18c4ed13655eed91d18db556864afd512de1170b41e0aeecc211b1577c98060f85b3d1cf7e4dff143a2d791d5", 0xdb, 0x101}], 0x4080, &(0x7f0000000340)='syz_tun\x00') socket$nl_generic(0x10, 0x3, 0x10) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x3, 0x420040) accept4$vsock_stream(r2, &(0x7f00000003c0)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80000) syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) [ 1088.549621] audit: type=1400 audit(1537945427.644:20523): avc: denied { map } for pid=5187 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:48 executing program 3: [ 1088.814282] audit: type=1400 audit(1537945427.644:20524): avc: denied { map } for pid=5190 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1088.974922] audit: type=1400 audit(1537945427.664:20525): avc: denied { prog_load } for pid=5189 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1089.114616] audit: type=1400 audit(1537945427.684:20526): avc: denied { map } for pid=5190 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1089.268046] audit: type=1400 audit(1537945427.714:20527): avc: denied { prog_load } for pid=5189 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1089.415607] audit: type=1400 audit(1537945427.734:20528): avc: denied { map } for pid=5190 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x500000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1089.572281] audit: type=1400 audit(1537945427.744:20529): avc: denied { map } for pid=5188 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:49 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0xcc) 07:03:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:49 executing program 3: 07:03:49 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000140)="ca5247075baf02380a9629d0dd043d939ea674df22a4c61bf2873ad9b66d496a4a38bfaea42ed6a6afa8bd85d582fd60136efd6970ef0c05757184f986a0b0b4516a887ec940d196770929fb18d8e232bf4fa41925ddcbb737e45b57bfa9d9e7a790df076000ae957334b54fd1454262353d0744d0d08d13059119238133f003eed4f1d4d6b03866a22c3e7eaedc38d0e01e681e46d5c6c4d3049e7d7fc46779b6b7652d2931599b71f51709ca2e322185996168ea5df1", 0xb7, 0xfffffffffffffff8) r3 = add_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)="ae466d1341f5370a9b7422dac2e4fe4dbf9cfef6b31733f7f315890797391968e68a1b31d2df25528b382d70d520fc1c4e100d63f6e08310fc1e1f0bae93e60a0f94c6ae401d93917595fb7b895cbbbf730028cb7b1371338a7848402f213a0af42d0e6619ad557a2a9609dc0f", 0x6d, 0x0) keyctl$unlink(0x9, r2, r3) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @random='?UP/*b', 'lo\x00'}}, 0x1e) init_module(&(0x7f0000000300)='big_key\x00', 0x8, &(0x7f0000000340)='big_key\x00') 07:03:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:50 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0xcc) 07:03:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:50 executing program 3: 07:03:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xc000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:51 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) r2 = socket(0x15, 0x5, 0x2) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000080)=""/59, &(0x7f00000000c0)=0x3b) 07:03:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x500, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:51 executing program 3: 07:03:51 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0xcc) 07:03:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:52 executing program 0: [ 1092.857045] kauditd_printk_skb: 171 callbacks suppressed [ 1092.857061] audit: type=1400 audit(1537945432.584:20701): avc: denied { map } for pid=5271 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:52 executing program 3: 07:03:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x6800) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1093.099175] audit: type=1400 audit(1537945432.624:20702): avc: denied { map } for pid=5273 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x17f, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1093.285559] audit: type=1400 audit(1537945432.684:20703): avc: denied { map } for pid=5271 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:53 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0xcc) [ 1093.451331] audit: type=1400 audit(1537945432.704:20704): avc: denied { map } for pid=5273 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1093.616997] audit: type=1400 audit(1537945432.764:20705): avc: denied { map } for pid=5271 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1093.807465] audit: type=1400 audit(1537945432.784:20706): avc: denied { map } for pid=5271 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1093.956916] audit: type=1400 audit(1537945432.814:20707): avc: denied { map } for pid=5279 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:53 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RLINK(r0, &(0x7f0000000100)={0x7}, 0xffffffb5) [ 1094.153023] audit: type=1400 audit(1537945432.814:20708): avc: denied { map } for pid=5279 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r2, &(0x7f0000057fa0)=[{}, {}], 0x9407fdad) munmap(&(0x7f000059e000/0x4000)=nil, 0x4000) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) [ 1094.356855] audit: type=1400 audit(1537945432.824:20709): avc: denied { map } for pid=5273 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x900, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1094.560301] audit: type=1400 audit(1537945432.854:20710): avc: denied { map } for pid=5281 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:03:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7f01000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:54 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0xcc) 07:03:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0xf0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) 07:03:55 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0xcc) 07:03:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6c00000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:03:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:03:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x8004) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:03:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) listen(r0, 0x200000000002) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340), &(0x7f0000000380)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) 07:03:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x40000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1097.929955] kauditd_printk_skb: 167 callbacks suppressed [ 1097.929971] audit: type=1400 audit(1537945437.654:20878): avc: denied { map } for pid=5362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.129588] audit: type=1400 audit(1537945437.664:20879): avc: denied { map } for pid=5362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.277061] audit: type=1400 audit(1537945437.704:20880): avc: denied { map } for pid=5362 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.458692] audit: type=1400 audit(1537945437.734:20881): avc: denied { map } for pid=5362 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.645555] audit: type=1400 audit(1537945437.784:20882): avc: denied { map } for pid=5365 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.790227] audit: type=1400 audit(1537945437.804:20884): avc: denied { map } for pid=5365 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.981819] audit: type=1400 audit(1537945437.794:20883): avc: denied { map } for pid=5362 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1099.184330] audit: type=1400 audit(1537945437.834:20885): avc: denied { map } for pid=5365 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1099.354273] audit: type=1400 audit(1537945437.884:20886): avc: denied { map } for pid=5365 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1099.408362] audit: audit_backlog=65 > audit_backlog_limit=64 07:04:00 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:00 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}, 0xcc) 07:04:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x29000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6800, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x10000) faccessat(r0, &(0x7f00000001c0)='./file0\x00', 0x11d, 0x200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000000380)=@nfc_llcp, &(0x7f0000000400)=0x80, 0x80800) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000007c0), 0xfffffcdb) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r3 = memfd_create(&(0x7f00000006c0)='/dev/adsp#\x00', 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f041c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) capset(&(0x7f00000002c0), &(0x7f0000000300)={0xbfc, 0x48000000, 0x0, 0x0, 0x0, 0x1}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000800)={0x4, r1, 0x1}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000640), &(0x7f0000000680)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000840)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1, 0x100000001}}, 0x9, 0xf17}, &(0x7f0000000000)=0x88) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000480)={0x0, 'bond0\x00', 0x4}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000900)={r4, @in={{0x2, 0x4e21, @multicast2}}, 0x9, 0x8336, 0x101, 0xfffffffffffffffb, 0x8000}, &(0x7f0000000340)=0x98) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000600)) nanosleep(&(0x7f00000005c0)={0x0, 0x989680}, 0x0) setpriority(0x0, 0x0, 0xfffffffffff7fff8) 07:04:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x40000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:00 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0xcc) 07:04:00 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf5ffffff, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000180)={0x6, 0x7, 0x474, 0x8001}, 0x8) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f00000005c0)={0x170, 0x0, 0x2, [{0x6, 0x80, 0x2, 0x3fd, 'fd'}, {0x6, 0x9, 0x0, 0x1000}, {0x3, 0x0, 0x1, 0x7, '&'}, {0x1, 0x4, 0x2, 0xd4, 'fd'}, {0x5, 0x1, 0x1c, 0x7, "2b73797374656dcc6370757365746367726f7570246367726f757015"}, {0x6, 0x2, 0x5, 0x7a23, 'fuse\x00'}, {0x2, 0x7ff, 0xf, 0x8, "7dbc76626f786e6574302d2f656d30"}, {0x3, 0x7fff, 0x7, 0x2, 'user_id'}, {0x4, 0xfffffffffffffff7, 0x1, 0x3b, '&'}, {0x2, 0x101, 0xb, 0x2, 'em1nodevem1'}]}, 0x170) read$FUSE(r0, &(0x7f0000002000), 0x1000) 07:04:01 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x4000) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x80000) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000100)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x8000000, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc31916444300000788ccfc7f66051042714b7effffff7f4a00"}, 0x60) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000001c0)="bed9360ffbbbdd30535d1d1c320bdcc4", 0x10) 07:04:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:01 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0xcc) [ 1102.515452] FAULT_INJECTION: forcing a failure. [ 1102.515452] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.527087] CPU: 1 PID: 5430 Comm: syz-executor3 Not tainted 4.19.0-rc5+ #33 [ 1102.534289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.543656] Call Trace: [ 1102.546263] dump_stack+0x1c4/0x2b4 [ 1102.549913] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1102.555146] should_fail.cold.4+0xa/0x17 [ 1102.559239] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1102.564356] ? graph_lock+0x170/0x170 [ 1102.568184] ? print_usage_bug+0xc0/0xc0 [ 1102.572258] ? print_usage_bug+0xc0/0xc0 [ 1102.576348] ? __mutex_lock+0x85e/0x1700 [ 1102.580499] ? tun_get_user+0x1e02/0x42a0 [ 1102.584677] ? mutex_trylock+0x2b0/0x2b0 [ 1102.588752] ? mark_held_locks+0x130/0x130 [ 1102.593015] ? mark_held_locks+0x130/0x130 [ 1102.597262] ? print_usage_bug+0xc0/0xc0 [ 1102.601335] ? check_preemption_disabled+0x48/0x200 [ 1102.606375] ? print_usage_bug+0xc0/0xc0 [ 1102.610459] __should_failslab+0x124/0x180 [ 1102.614711] should_failslab+0x9/0x14 [ 1102.618524] kmem_cache_alloc+0x47/0x730 [ 1102.622595] ? print_usage_bug+0xc0/0xc0 [ 1102.626671] ? print_usage_bug+0xc0/0xc0 [ 1102.630754] __build_skb+0xab/0x430 [ 1102.634396] ? skb_try_coalesce+0x1b70/0x1b70 [ 1102.638921] ? __alloc_pages_nodemask+0xde0/0xde0 [ 1102.643793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.649343] ? check_preemption_disabled+0x48/0x200 [ 1102.654387] __napi_alloc_skb+0x1d6/0x310 [ 1102.658595] napi_get_frags+0x67/0x140 [ 1102.662508] tun_get_user+0x1e6c/0x42a0 [ 1102.666529] ? tun_build_skb.isra.53+0x2230/0x2230 [ 1102.671471] ? debug_smp_processor_id+0x1c/0x20 [ 1102.676156] ? perf_trace_lock+0x14d/0x7a0 [ 1102.680421] ? zap_class+0x640/0x640 [ 1102.684147] ? zap_class+0x640/0x640 [ 1102.687888] ? check_preemption_disabled+0x48/0x200 [ 1102.692950] ? find_held_lock+0x36/0x1c0 [ 1102.697038] ? tun_get+0x206/0x370 [ 1102.700610] ? lock_downgrade+0x900/0x900 [ 1102.704768] ? check_preemption_disabled+0x48/0x200 [ 1102.709807] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1102.715614] ? kasan_check_read+0x11/0x20 [ 1102.719775] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1102.725065] ? rcu_bh_qs+0xc0/0xc0 [ 1102.728633] ? tun_get+0x22d/0x370 [ 1102.732198] ? tun_chr_close+0x180/0x180 [ 1102.736291] tun_chr_write_iter+0xb9/0x154 [ 1102.740553] do_iter_readv_writev+0x8b0/0xa80 [ 1102.745088] ? vfs_dedupe_file_range+0x670/0x670 [ 1102.749884] ? rw_verify_area+0x118/0x360 [ 1102.754073] do_iter_write+0x185/0x5f0 [ 1102.757998] ? dup_iter+0x270/0x270 [ 1102.761643] vfs_writev+0x1f1/0x360 [ 1102.765306] ? vfs_iter_write+0xb0/0xb0 [ 1102.769306] ? wait_for_completion+0x8a0/0x8a0 [ 1102.773931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.779490] ? __fdget_pos+0xde/0x200 [ 1102.783316] ? __fdget_raw+0x20/0x20 [ 1102.787040] ? __sb_end_write+0xd9/0x110 [ 1102.791125] do_writev+0x11a/0x310 [ 1102.794697] ? vfs_writev+0x360/0x360 [ 1102.798518] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1102.803998] __x64_sys_writev+0x75/0xb0 [ 1102.807991] do_syscall_64+0x1b9/0x820 [ 1102.811899] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1102.817283] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1102.822285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1102.827179] ? trace_hardirqs_on_caller+0x310/0x310 [ 1102.832227] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1102.837259] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1102.842297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1102.847231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.852464] RIP: 0033:0x457431 [ 1102.855674] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 54 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 1102.874595] RSP: 002b:00007fdfbdb42ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 1102.882359] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000457431 [ 1102.889655] RDX: 0000000000000001 RSI: 00007fdfbdb42bf0 RDI: 00000000000000f0 [ 1102.896940] RBP: 0000000020000640 R08: 00000000000000f0 R09: 0000000000000000 [ 1102.904220] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fdfbdb436d4 [ 1102.911523] R13: 00000000004c48a4 R14: 00000000004d7b90 R15: 0000000000000004 [ 1102.940401] kauditd_printk_skb: 339 callbacks suppressed [ 1102.940417] audit: type=1400 audit(1537945442.664:21224): avc: denied { map } for pid=5433 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.119991] audit: type=1400 audit(1537945442.704:21225): avc: denied { map } for pid=5429 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1103.282118] audit: type=1400 audit(1537945442.714:21226): avc: denied { prog_load } for pid=5431 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:04:03 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0xcc) 07:04:03 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x20}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) mlockall(0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r2, &(0x7f0000000040), 0x8001) [ 1103.427062] audit: type=1400 audit(1537945442.714:21227): avc: denied { map } for pid=5429 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.531990] audit: type=1400 audit(1537945442.744:21228): avc: denied { map } for pid=5429 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc4000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1103.665273] audit: type=1400 audit(1537945442.754:21229): avc: denied { map } for pid=5429 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.780540] audit: type=1400 audit(1537945442.764:21230): avc: denied { prog_load } for pid=5431 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1103.921742] audit: type=1400 audit(1537945442.804:21231): avc: denied { map } for pid=5429 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1104.058969] audit: type=1400 audit(1537945442.804:21232): avc: denied { map } for pid=5433 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x200000) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0x10, 0x0, 0x5}, 0x10) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) shutdown(r2, 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1104.181962] audit: type=1400 audit(1537945442.884:21234): avc: denied { map } for pid=5433 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:04 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xcc) 07:04:05 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7a00000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1105.417895] XFS (loop5): Invalid superblock magic number 07:04:05 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0xcc) 07:04:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000040)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) sched_setparam(r2, &(0x7f00000000c0)=0x287) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xfff, &(0x7f00000005c0)=""/240) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff5, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff030000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:05 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0x1}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0xff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) getsockname$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10) open(&(0x7f0000000280)='./bus\x00', 0x4280, 0x100) 07:04:06 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0xcc) 07:04:06 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0xfffffdef, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:07 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$session_to_parent(0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x26, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4f) 07:04:07 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0xcc) 07:04:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_cache\x00') ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000080)={0x5, &(0x7f0000000240)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000340)='./file0/file0/file0\x00', 0x10000000001002, 0x10) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:07 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0xfdef, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1107.980276] kauditd_printk_skb: 150 callbacks suppressed [ 1107.980293] audit: type=1400 audit(1537945447.704:21384): avc: denied { map } for pid=5538 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.169905] audit: type=1400 audit(1537945447.774:21385): avc: denied { map } for pid=5538 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x68, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1108.344128] audit: type=1400 audit(1537945447.794:21386): avc: denied { prog_load } for pid=5541 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1108.454243] audit: type=1400 audit(1537945447.824:21387): avc: denied { prog_load } for pid=5541 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1108.601665] audit: type=1400 audit(1537945447.824:21388): avc: denied { map } for pid=5538 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.787835] audit: type=1400 audit(1537945447.894:21389): avc: denied { map } for pid=5538 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:08 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0xcc) [ 1108.976205] audit: type=1400 audit(1537945447.894:21390): avc: denied { map } for pid=5538 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe802, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200027400f8", 0x15}], 0x8000, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fdatasync(r0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000000080000000000000012de001c3a4e2311b580fbf902bf42e2ce65d65659f358dc1ab7332d0e145fc2eed78c43937aad9a85afe8273893388300000063a2d8fa246a1f22794fbb1ceeb7a53617aad88a58766ded2ad1ca13b12b38cb84000000000000000000000000"], 0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$vsock_stream(r1, &(0x7f00000003c0)={0x28, 0x0, 0x2711, @hyper}, 0x10) membarrier(0x32, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) lstat(&(0x7f0000000140)='./bus\x00', &(0x7f00000005c0)) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x4) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) write$selinux_user(r1, &(0x7f0000000440)={'system_u:object_r:systemd_tmpfiles_exec_t:s0', 0x20, 'root\x00'}, 0x32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) syz_open_dev$rtc(&(0x7f0000000380)='/dev/rtc#\x00', 0x9, 0x10000) ioctl$RTC_PIE_ON(r1, 0x7005) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000200)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x100000, 0x7007, 0x9, 0x1, 0x1}) [ 1109.191681] audit: type=1400 audit(1537945448.014:21391): avc: denied { map } for pid=5544 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:08 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x140, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0093be385f08c89ab78c63120ef88811d24d78e4d89e364bdacc9f6e49676eab286e14b6bdc8c0a9d094c39cf3f4b6ddf68a72ad9d66e2f72217de0d4d9b2dc5018b913f553fda12ff74bb65c592753e9f96eb96773d5e84c27618aedc8f9191843d78ac236f0fc5fb9e87a094759a183bdd7acab732ccc292cf46ce63e239045e5bc3f8d13e79"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f757015000000000c110c957d05b967bfcfef7580f9218c22fce631ff3963f90d3f3b80afe4d977028da14807fd909347e01ea8667bd79748fbe7480ba76e796bc32c9125a246f9678484a9b2f60e5cb13717c9c6273aaf2a84d801ceb5623b277bfb6d2e7f02b7"], 0x90) [ 1109.380162] audit: type=1400 audit(1537945448.074:21392): avc: denied { map } for pid=5544 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff03000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1109.564343] audit: type=1400 audit(1537945448.074:21393): avc: denied { map } for pid=5544 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:09 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0xcc) 07:04:10 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0xd, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x300, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x9b582c, 0x7, 0x0, 0x18, "e25af142df4ee0024ae8d10ac1930a67f7eba826e882a2ac3559cc62ef73980da9f4286b3756415eddf7744c839b1779b3dfb1ac491e75a97d3c43e8d466dc1e", "3dc1ed223e17d6fba2d8c162359b1f9a8da2cddd3270b0974595047584d2b682", [0x3, 0x88]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000002000), 0x1000) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x3}}, 0x50) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='em1nodevem1', 0xb, 0x1) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c19000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 07:04:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff1f0000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:11 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000002) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc0505510, &(0x7f0000000100)={0x20000000, 0x4, [0x0]}) 07:04:11 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}, 0xcc) 07:04:11 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2000066a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:12 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}, 0xcc) 07:04:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) sendmmsg$unix(r2, &(0x7f00000005c0)=[{&(0x7f0000000380)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000940)="6ae91cef60cb60485cad07184d4696c7ec0be60d8ceb6cd942ca295557ea71f4ced4542adffb3f05e11d27391c2fccf246f0625bd6f621a1826386c3df2818cafdb714d362ccc49e6c8f5e8e4c632bff8192ef6287f7ce87d110478cb485ce66dac6fb4706a7501c66730804e793ebb54f22328e1dd7f6697a007f9ed15ec3b6e40e82b143689d889eae1a6258c722adbcd1db4360a785663994486cc7b73c83c43341931beaf19d5d0c3f6e4e4f87a8a455c65a31fd154e2bd55f7fa67aa0989dcd6a20526ea9c885df870cfb11f30ac16f898813b51c225dda1f1c8016a7068da3e51a2b05b4b802c414320f2e481e63ac14ff721081d212084d70049ef8270d8cbea358e60e190ebfd9c4bd08fa37c98da77dbd9fb3f826815db205df653f98d84b620f49572302c0915511d91672ddbe9c85339d41d39d9adb76165fb156b9ce7603d9f5183d18bfb8e7c9109038c612b832df4dc737d8cb3ca0e9729326f9ae01c06c132f7002e37931c66ab5be4bd68652a53b3ebc09ff3801a174725edcc844de2204eb2371e21610410fd86827f87c7645fb8e3f3ea294a7696d668980227309a3da85ce7023da888a1cba464789497b7877e4dfdc7ea004568eec1d43c2f85717c187f7b2414709925434713a514bdd5f0ac66d3b813c62fc049ec178db6e42a53612a4556fa8b1322ab33088b6bcf02afb5809a2fd19fb52feafadae722c0ea86e2f2965d4fe50d85190c875543d672faf1d783a4b94af1d6a8a1805fe8484943ef18a20b5ce6d0b7d7684b0e78944cde5146570c3f31627c1068a8dcf721a0ff728c3db44453911779782bf17449526dad909f79424930a6cc5fb21e20119fe409624e5e0e489e6803a8031dfbb8dacd8ed713a2b38d11c375f84939f01664de5401fd9313854306d66b94f3f231bd544a66d87f8a5f5395adad6203cccde430a9afacf9c31e10a946ce71c7085fa01716257dfb8af8e0d5983950d43d04f23c9934a52e482889842433b3f7650152f0d2b02f732e01968550b1980bc038e45fc93651b55e4952a1eb15b92541eceea2b9c4b399edb6f696eae7763ca49d8da1b98b515e16c674bdaa7540275cd5d0cbdbd5afec453a4ca78e92d95df758fd6d978a258c1588fc110744c878f879739b1614e643fd24f84b28304279601b449819d162984f503446fe06a36a2cfe42a91ca3bcc29b449d70a9fa50e7eba9c7b34f3e8c8d059e19c05a48e88c860bfb8b138bca64392e9694bc0d3597c41cbd703fcf032cc804aab32aa3c422f2535048fb9ddb9b5a84fb3e2c32087c643fd10ed82be2c3fdf6f05c992a1e8d86eab2b0a4272c60b3c1b539ebb66951d30f10d30e2643a58e975f8c318ce6c9495768a61859d4a8ae623fc0aa12004845573191a319ce40e43212840be3212fc33488ad33cd108b0fc4e0290a8327d055ec2a96ff90c6f1327668c24b5f500ad46c24fbffb7433b6e6c3f638f7ea17facce41f94b5709c46cee5f9ffea237ee1bcd49a9d47b3249423549460d1ed27f6d12dcd4c55b7bd0df1057937e30bbae4862bb0a28b3f14437f4802f41c8fdc63b077535aba300fca798d9b67d214f94ce6ea4c99ad2d335c80764c261da98d0c4df5fda93c587274b19d67e0d070bae2c10fb0eb696cb326e2a80bb1bc380cb44a352c2d539422feefb9c64b658337cb5b69d7eaf6795250d3eadccbc5b384eaf26debc22f2852aa95239c8e1eec4551aaddcafba21d8f722905ad5847ab6e6dfae35bcb805fce82df169163c4f060289f2ab7bf88b89489037c7b0317de6ededa765324ce0b6d399106e36f78c4a202ff5f340bc6d9c51fa234c00fbac239d1fc698be20a4e59b63e7e053a7437616810fbf24a96ada37c5f373b04186ae0817002d02d03620909294d7246bb644246c4bb5869988f56997c5b7428ae47d504bc61474858a02181aaca22a9491f04aac1bd3511b5b9f5626f4405849568f46fdcbcc4c53c05ef8cec4187c173a43815a387a65ff8a19845c33550ebe4f706bb970a904e0292f0a9292717eb1bf3dadb9975c6f7681fbdd748c7c365f17301f268d79ecad2be49ac326fef805a4d7ce4a9aa1f237ed56be494fe6f5c617769871c82e1c6ebd4ea10bcd53858948adb93a2ff7214a93a1576d193f955834bb6a325b0183a7eb5f874f909460da400b7dd8a068196979417aa55e5a49ed50de1d3f40d9016700031af949bf8d8de2656ce4787cb117f54d93fda3a89a75a78bbb6db2a1624e67bbbe79e8877f9362b6714cafbd50dfe0b1305572cde1a78396aa0086e2b527607a27d00087f2a1eaff41cc70c2042bd8c560745a10219946019d08fe052eb825100c3486843f0a81349b143765a0b79609a13e080a259ae9a9a094271d3fc16b5ae894a3d6d34f79fdc8de748ad1b8d16d670f12c1c337af8578b52edcf812778ea3664e32f9579eac0e7ddb5714cf8051bca227f960c29e859c9daa7545b7cf04a1c82fcde3fcd1b5a2a96cd6d4a339efacdb8c886f490a03f25c8cf2cc6a8cb39042f98de5ed8bb17120dfd9a0eb3d006cc5fd5d50bc129eaa94a75c8b1bee93faccdf173c38b1b5f8cb0be09323400735bb442f33f844c9451b2a3524c704ed6b8566c9d4d97baa15be193ea9edd7b05bf64198b8fd8a50a428b1e1fa4186c45a40c3a9b56df1b3c6a003d7af12c3b2645b2c017", 0x77d}], 0x1, 0x0, 0x0, 0x20000000}], 0x1, 0x800) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)={0x0, 0xffffffffffffff6b}) r3 = pkey_alloc(0x0, 0x3) pkey_free(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/autofs\x00', 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r5, r4}}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x5, @ipv4={[], [], @multicast1}, 0x200}}, 0x1a3f, 0x0, 0x7, 0x3}, &(0x7f00000000c0)=0x98) umount2(&(0x7f0000000780)='./file0\x00', 0x0) [ 1113.020755] kauditd_printk_skb: 149 callbacks suppressed [ 1113.020772] audit: type=1400 audit(1537945452.744:21543): avc: denied { prog_load } for pid=5625 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1113.145852] audit: type=1400 audit(1537945452.794:21544): avc: denied { prog_load } for pid=5625 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:04:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:12 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x7ffff000, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r2, 0x81}, 0x8) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1113.462421] audit: type=1400 audit(1537945453.184:21545): avc: denied { map } for pid=5635 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1113.539301] audit: type=1400 audit(1537945453.214:21546): avc: denied { map } for pid=5635 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1113.730456] audit: type=1400 audit(1537945453.244:21547): avc: denied { map } for pid=5635 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:13 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0xcc) [ 1113.911599] audit: type=1400 audit(1537945453.264:21548): avc: denied { map } for pid=5635 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1114.120770] audit: type=1400 audit(1537945453.354:21549): avc: denied { map } for pid=5635 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x47030000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1114.344613] audit: type=1400 audit(1537945453.384:21550): avc: denied { map_create } for pid=5642 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:04:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0x14) write$vnet(r1, &(0x7f0000000480)={0x1, {&(0x7f0000000580)=""/4096, 0xfffffffffffffd75, &(0x7f0000000280)=""/205}}, 0x2c5) fcntl$setstatus(r1, 0x4, 0x44000) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000100)) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3000005, 0x1012, r0, 0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 1114.583262] audit: type=1400 audit(1537945453.414:21551): avc: denied { map } for pid=5635 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:14 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1114.799436] audit: type=1400 audit(1537945453.434:21552): avc: denied { map } for pid=5635 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_STATFS(r0, &(0x7f0000000080)={0x60, 0x0, 0x8, {{0x8000, 0x0, 0xd3, 0x2, 0x45db, 0xb3a, 0x8000, 0x6}}}, 0x60) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000005c0)=""/200) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:14 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0xcc) 07:04:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1c00, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:15 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b11c485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00', 0x3) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000240)=""/160) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000100)={0x3, 0x8000, 0x5}) r1 = request_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000380)='&cpuset\x00', 0xfffffffffffffffb) r2 = add_key(&(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000cc0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="8ed7e141bdae1422ec90f596d1272e3e6aeaaf66c08c702ca58458058ddaa8336576cef6879b012113c1564dcfcfcc933b92e2259753069290d6134a5846872d64f3b385b1eff55a3f9e62e7539f3bc323b726e3af628d977df264e0c63d0361fadea60c1b966f0e92d5de80575dc5d614d5cade90d1677c56fe474f9bf75ddd07", 0x81, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000580)="bcfa6cdc47750c5fd326c6b0a9359b5964136c4f581e99c6325fcd2d0ff31910f34256ecfa456cb39dba0128136672af96b3728ec8758f112e0c9fff48be9195ae8653111013f71d7c555ccadcab31da6c00fa6abd76c8b874cc8704007e5e0163701fc9e608e20e1b839f4fc19576fac3f837a19e731788b49691e44b3be5bb2066a9e27d0b73", 0x87, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000a40)={r1, r2, r3}, &(0x7f0000000a80)=""/93, 0x5d, &(0x7f0000000bc0)={&(0x7f0000000b00)={'sha1-avx\x00'}, &(0x7f0000000b80)="eeef1ab1ed051420fb6de99d692520bb", 0x10}) rseq(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x5}, 0x140, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000c00)={0x401}, 0x1) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) chroot(&(0x7f0000000e40)='./file0\x00') syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) openat(r0, &(0x7f0000000e00)='./file0\x00', 0xc2, 0x80) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000c80)={0x8, &(0x7f00000000c0)=[{0x0, 0x100, 0x2, 0xffffffffffffd7f7}, {0xffffffffffffffff, 0xfff, 0x7, 0x1}, {0x5, 0x8, 0xb6, 0x6}, {0xff, 0x651, 0x0, 0x5}, {0x400, 0x200, 0x9, 0x65e}, {0x7fff0, 0x8, 0x401, 0x5}, {0x100, 0x2f, 0x3, 0x2}, {0x8001, 0xbb9, 0x8, 0x3}]}) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000d00)={0x2, 0x0, @pic={0x3, 0x100000001, 0xf0, 0x3c5, 0x2, 0xf51b, 0x80000001, 0x3, 0x7ff000, 0x9, 0x7, 0x10001, 0x3, 0x5, 0x0, 0x5}}) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000640)={"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"}) getitimer(0x2, &(0x7f0000000c40)) ioctl$KVM_RUN(r7, 0xae80, 0x0) 07:04:16 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0xcc) 07:04:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d0000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000000000000000000000000000"], 0x90) 07:04:16 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0xcc) 07:04:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x55c198faf5, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:17 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b104485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:17 executing program 0: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e24, 0x6, @loopback, 0x3}, {0xa, 0x4e24, 0x200, @loopback, 0x49b}, 0x253267ec, [0x0, 0x8001, 0xfffffffffffffff8, 0x81, 0x9, 0x1ff, 0x0, 0x6]}, 0x5c) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_eeprom={0x32}}) [ 1118.107572] kauditd_printk_skb: 141 callbacks suppressed [ 1118.107589] audit: type=1400 audit(1537945457.834:21695): avc: denied { map_create } for pid=5716 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:04:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7400, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:17 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0xcc) [ 1118.304292] audit: type=1400 audit(1537945457.824:21694): avc: denied { map } for pid=5718 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1118.504545] audit: type=1400 audit(1537945457.834:21696): avc: denied { map } for pid=5718 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = dup3(r0, r0, 0x80000) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x8000, 0x7}, 0x4) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1118.693192] audit: type=1400 audit(1537945457.884:21697): avc: denied { map } for pid=5718 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1118.862055] audit: type=1400 audit(1537945457.904:21698): avc: denied { map } for pid=5718 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1119.041067] audit: type=1400 audit(1537945458.014:21699): avc: denied { map } for pid=5718 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:18 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b10d485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1119.244407] audit: type=1400 audit(1537945458.094:21700): avc: denied { map } for pid=5718 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1119.422315] audit: type=1400 audit(1537945458.154:21701): avc: denied { map } for pid=5718 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:19 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xcc) 07:04:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x480, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1119.704766] audit: type=1400 audit(1537945458.164:21702): avc: denied { map } for pid=5718 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1119.854426] audit: type=1400 audit(1537945458.194:21703): avc: denied { map } for pid=5722 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:20 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b13e485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6800000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:20 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0xcc) 07:04:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0xffff}}, 0x50) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000240)={@loopback, @broadcast}, 0x8) r2 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x2f, 0x2, 0x3, "d85ea561f460c2dae65b395fe49ea210", "6b9e5b5c5b6efde4a1030185f7ca083d85d38b20d12b75e8ee4d"}, 0x2f, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x80000001) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x275, 0x4) 07:04:22 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) socket(0x5, 0x804, 0x100000001) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x264000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000500)=""/138) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='(\x00'}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) fchdir(r0) r3 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key(&(0x7f00000007c0)='pkcs7_test\x00', &(0x7f0000000800)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000840)="e327a5a8b68491dc68d9b2e6c8db920cf1677517d5c4ce5035982b86e7d15b19e8247ce5d0b8b066a743fe8f5b4062bdb04f26a05b4904eaf090500d6e0dd45887c4e4cf8b4675b31fe6c3dc67021252631e84476b6eb245f949b0263961c102abebd1f059febfa34448ec7ee8dc48bedcbe58e4069f9921c63fc2623dc1187b2e3e171cb1eafdaeb7b91b5c1bfe67e6c2f549968872ec7e60a5905ddd32415ead3a621a84bcdd9cbb20", 0xaa, 0xfffffffffffffff8) keyctl$link(0x8, r3, r4) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r7) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x80000001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="d2eb2b08ddba17d456d1fe841ac550bc4ecf2b9b2227c4ba5ede53d6c7d5f36eb64d918de48abaa0a52c62f3cb5a171100431fd095a9eb200864b22ba9f5502f95d8d505745529d16e7385e81d89a7a46a2e4a0925608c4a9e9294772f804462073a7432dc1efa74c9b1577d4338eced17b5b5495364e3a6bc847213af8b1c95bceb7d07a8d107e2d0c40ed06071e22156", 0x91, 0x3ff}, {&(0x7f0000000180)="904eb90a3e8b5fdfdbd610c36f7993a1ec86a7385c0eccf0d9186d598270a3ba4876", 0x22, 0x85}, {&(0x7f00000002c0)="9807d75281b601b3db842f9fbc4e2ee3f4ead02322f31948531022b92c97c17be3956ff73d8f5446f7b86feaa582660613bca3b3f96bbdbd6eff4c76c58aeeabaf157226ed692a1057fea463022bb5c45ae7ae54ad121f795212d132ec57a66f05cc2d14401e8395aba1f59f1bf82dcac7a9df9baa6e99299cb42c940cff006e62f8f21a851c07b63c6d46cc6e2979be94d9b79c22ce8082e3c4781e6d8262e65f1b8e8920", 0xa5, 0x1000}], 0x10000, &(0x7f0000000640)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r6, @ANYBLOB="2c6673636f6e746578743d73797374656d5f752c736d61636b8373726f6f743d5e47504c2c636f6e746578743d757365725f752c636f6e746578743d73746166665f752c7365636c6162656c2c736d61636b66736465663d2c736d61636b6673666c6f6f723d2f6465762f7161745f6164665f63746c002c7365636c6162656c2c636f6e746578743d73797361646d5f752c002a26c9321fa68fe9bfa410f3f30a426437baa3c67b34f09762e10b7b1d8dd65989f451cfe083e2d93e6231e1b662fe6ae918b05f41e37f6e578a4c1ba2ba6aa91c5a22f360d4378478ec40941b318ff896c205b37c08dd0589db9db02a00996dc5231c261b42744f96a85b9171f9ca91cdd773f9c73703600e370343fafcad5cce87a15bd44a9981154cff153595395f38ce3f32f8760733d66830899ba7e845d3a01248"]) ioctl$KDDISABIO(r5, 0x40096100) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000040)=0x100, 0x4) 07:04:22 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b1e0485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:22 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0xcc) 07:04:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1123.165275] kauditd_printk_skb: 196 callbacks suppressed [ 1123.165291] audit: type=1400 audit(1537945462.894:21900): avc: denied { map } for pid=5790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1123.257097] audit: type=1400 audit(1537945462.904:21901): avc: denied { map } for pid=5790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x100000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:23 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0xcc) 07:04:23 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b106485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1123.458168] XFS (loop5): Invalid superblock magic number [ 1123.468653] audit: type=1400 audit(1537945462.924:21902): avc: denied { map } for pid=5790 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1123.624241] audit: type=1400 audit(1537945462.954:21903): avc: denied { map } for pid=5790 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1123.794256] audit: type=1400 audit(1537945462.954:21904): avc: denied { prog_load } for pid=5792 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1123.994919] audit: type=1400 audit(1537945462.964:21905): avc: denied { prog_load } for pid=5792 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1124.163783] audit: type=1400 audit(1537945462.974:21906): avc: denied { map_create } for pid=5794 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1124.396064] audit: type=1400 audit(1537945463.034:21907): avc: denied { map } for pid=5795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:24 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0xcc) [ 1124.634544] audit: type=1400 audit(1537945463.044:21908): avc: denied { map } for pid=5795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1124.662381] audit: audit_backlog=65 > audit_backlog_limit=64 07:04:26 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001, 0x20000000}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40000, 0x0) ioctl(r0, 0x2285, &(0x7f00000000c0)="08000000d725c62b4375b8848912945d8d0c3166ce51b4ee7a528c9f6422a8621db9844c48a6c3e86e2dc3d04922044f0aeb904dad9cb7f739c601a856559c77b3eca073fe55afd1361c931909daad7c315383dc256fe764a7a89a4cd4acddf59ba0d9e918e383fd887a0f2c5a29f824659e35000000000000000000005301af526390ae4a3bb3c33db734e7dd3528e65e73cbed41143f0f51b26a9fb3560b593f619124e131be5c4f1f98dcd7f533ab7d1b3120568e30b311841d7ae4dfb44a1142b4a76788dc67417033230f5b1b3dbb7e6039851872cd91e68b1e870c23c884b87ff12bbfc9bcdcd2bedd89f6811f70847ec0c3c019225b30589f10f5") 07:04:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x80040000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:26 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b107485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:26 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0xcc) 07:04:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="66643d0d9bf6e93d0b74c12408b68c6a6265772ef1456ff8fe9947c55901797127059e7d7fa6040000007d28ac804fd9a1f104cdee8a5b215e4df1e867344a4cef861fe077d97b77c629627161e7c9b5078990243bcc187e338de9ad79e9ca13f153505eca6bd3325d12dd68976a49db86a091565adea9b09daa891a0d68513b825874f199ee6520d955cd9bbabd2a85695a71d6c85cf91a41b616e5a85f11dabdd0d98cb7a13f00000000000000f64d3b64d485923e2c16d7f30e3c9b3638cb454bfeeb38000000000000000000000000a78b049525384e8978e238ab94719c7c41d2583a08eb05d943e207ef0c6b59", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4c00000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:26 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b114485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:26 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0xcc) 07:04:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe0000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="646407113d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c000000000000000000000000000000000000000000000036000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 07:04:27 executing program 0: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000140)={0xf, 0x8, 0xffffffffffffff80}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = socket(0x2, 0x2, 0x80008) getgroups(0x2bc, &(0x7f00000004c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) connect$nfc_llcp(r1, &(0x7f0000000400)={0x27, 0x1, 0x1, 0x7, 0x3, 0x2, "dc2c04ca35a55c4447c46d0fc25c4e430d79fab9ab831e6b2abd524534414c21fd2c8ffde46b199cb1b35a884963d5b3b02a5572e73c77490338873a99990a", 0x9}, 0x60) mknodat(r1, &(0x7f0000000480)='./file0\x00', 0x8000, 0x6) semget(0x1, 0x4, 0x8) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300), 0x0, 0xfffffffffffffffb) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/create\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x3, 0x4}) 07:04:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x8004000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:27 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0xcc) [ 1128.184845] kauditd_printk_skb: 269 callbacks suppressed [ 1128.184861] audit: type=1400 audit(1537945467.914:22137): avc: denied { map } for pid=5871 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:28 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b160485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1128.420346] audit: type=1400 audit(1537945467.934:22138): avc: denied { map } for pid=5890 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1128.635024] audit: type=1400 audit(1537945467.974:22139): avc: denied { map } for pid=5890 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1128.779788] audit: type=1400 audit(1537945468.014:22140): avc: denied { map } for pid=5890 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1128.939840] audit: type=1400 audit(1537945468.014:22141): avc: denied { map } for pid=5880 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x74000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1129.374370] audit: type=1400 audit(1537945468.034:22142): avc: denied { map } for pid=5880 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1129.408419] audit: type=1400 audit(1537945468.074:22143): avc: denied { map } for pid=5890 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1129.575906] print_req_error: 172 callbacks suppressed [ 1129.575917] print_req_error: I/O error, dev loop0, sector 0 [ 1129.586977] buffer_io_error: 168 callbacks suppressed [ 1129.586987] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 1129.600010] print_req_error: I/O error, dev loop0, sector 8 [ 1129.606219] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 1129.613908] print_req_error: I/O error, dev loop0, sector 16 [ 1129.619881] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 1129.627604] print_req_error: I/O error, dev loop0, sector 24 [ 1129.633429] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 1129.641251] print_req_error: I/O error, dev loop0, sector 32 [ 1129.647108] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 1129.654896] print_req_error: I/O error, dev loop0, sector 40 [ 1129.660712] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 1129.668455] print_req_error: I/O error, dev loop0, sector 48 [ 1129.674383] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 1129.682055] print_req_error: I/O error, dev loop0, sector 56 [ 1129.694411] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 1129.702156] print_req_error: I/O error, dev loop0, sector 64 [ 1129.708122] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 1129.715906] print_req_error: I/O error, dev loop0, sector 72 07:04:29 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0xcc) 07:04:29 executing program 2: pipe2(&(0x7f0000000040), 0x84800) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66e7e9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) dup2(r0, r0) [ 1129.721730] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 1129.761986] audit: type=1400 audit(1537945468.074:22144): avc: denied { map } for pid=5890 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf0000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:29 executing program 0: r0 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000080)={@loopback, @loopback, 0x0}, &(0x7f00000000c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000140)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000001940)={0x800000000000349, 0x0, [{0x2000, 0xaa, &(0x7f0000000300)=""/170}, {0x100000, 0x2cb, &(0x7f0000000580)=""/133}, {0x100000, 0xfc, &(0x7f0000000480)=""/252}, {0x2004, 0x30, &(0x7f0000000000)=""/48}, {0x0, 0xae, &(0x7f0000001700)=""/174}]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00']) r4 = socket(0x2, 0x7, 0x46) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 1129.925989] audit: type=1400 audit(1537945468.124:22145): avc: denied { map } for pid=5880 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1130.104243] audit: type=1400 audit(1537945468.124:22146): avc: denied { map } for pid=5880 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:29 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b108485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xad04, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:30 executing program 2: r0 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)='cpusetppp1-\x00', 0xfffffffffffffffe) r1 = request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000380)='#\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0x2, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f0000001000), 0x1000) read$FUSE(r3, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x90) 07:04:30 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0xcc) 07:04:31 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b103485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000000c0)=""/17) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000680)=""/134, 0x86}], 0x1, &(0x7f0000000940)=""/138, 0x8a}, 0x0) 07:04:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7f01, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:32 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0xcc) 07:04:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2, 0x89) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000080)={{0x2, 0x3, 0x403, 0x1, 0x738}, 0x7ff, 0x6, 0x3b}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370759265746367726f7570246367726f7570155a626f65d3fe37c92702db085fc9a475e304c6879ab4920078c6c06f2b17446adff0ccb2e83a800514ece3ea5e0fc184d874bcc4fbb7921729ae18c6c2b3348bcfd203a8110c5f6f3245c8a08634e86894942b17ed725cb29aadd449e57e6300bb7685fe6de585c9aa83d6c54ec82c43b003a0529fc53d67a1285d1cc38d83b9deef1cd66b057d2a035e54e808f7b395f5b4eff550f25c1babb6a8f4d183280f2797d151388e7bae8592b0176907c5a3ec50a54aad683bf3666e72be6f75a8777edbbb29495867cb0684e44508303a9c37a93c3e72d75f8409"}]}, 0xfffffffffffffe27) 07:04:32 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b102485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x5, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1133.197822] kauditd_printk_skb: 153 callbacks suppressed [ 1133.197839] audit: type=1400 audit(1537945472.924:22300): avc: denied { map } for pid=5977 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1133.358985] audit: type=1400 audit(1537945472.924:22301): avc: denied { map } for pid=5977 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:33 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0xcc) [ 1133.555563] audit: type=1400 audit(1537945472.924:22302): avc: denied { map } for pid=5975 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:33 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0x4e0, {{0x2, 0x4e22, @loopback}}}, 0x88) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 07:04:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x23, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1133.758568] audit: type=1400 audit(1537945473.024:22303): avc: denied { map } for pid=5975 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1133.977084] audit: type=1400 audit(1537945473.044:22304): avc: denied { map } for pid=5977 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="000000000000303030303030303034303030302c757365725f69643dccb9999bc5a99f05ba303c80eb360315e3f8d2691b53b63836e9281686f30cad1b625979f9e67985ef77f98fba0308d6b7160332aa3228429a5adb293d563db09fcc993298192c3f2c3d908989ae7da5a5fc456825f89340036dc52e6b8f2ebb743ad8a58fcbf1f4d32b515f8957ba0f88db216ae218d71dd4a07fede0f6c04e49baea708a8c573c61bcd7bd6b1a3a8e68ea82830000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0]]) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = gettid() migrate_pages(r1, 0x7, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x78f2) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0xffffffffffffffff}}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) r2 = getuid() quotactl(0x3ff, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f00000001c0)="973599394e7a360d8f51deba929acd9e511b01c9e20968a6cd804c99138b690f31d275a65fdb03b6fe1e79d87e0837a19645aaadeffab0d1a9d2f46ba2a8") [ 1134.131882] audit: type=1400 audit(1537945473.054:22305): avc: denied { map } for pid=5975 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1134.279318] audit: type=1400 audit(1537945473.074:22306): avc: denied { map_create } for pid=5978 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:04:34 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caaef", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1134.465000] audit: type=1400 audit(1537945473.084:22307): avc: denied { map } for pid=5977 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1134.673711] audit: type=1400 audit(1537945473.114:22308): avc: denied { map } for pid=5977 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:34 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0xcc) [ 1134.844253] audit: type=1400 audit(1537945473.134:22309): avc: denied { map_create } for pid=5978 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:04:34 executing program 0: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000340)=0xe8) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./control\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="02054cccd9ad49d35f25cfc58e3f7ccaa9dc3c5278baac5006", 0x19, 0x1}], 0x2, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-7'}}, {@iocharset={'iocharset', 0x3d, 'cp949'}}, {@uid={'uid', 0x3d, r1}}, {@creator={'creator', 0x3d, "ac49770f"}}, {@creator={'creator', 0x3d, "c170c03f"}}, {@file_umask={'file_umask', 0x3d, 0x7}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, "70707030637075736574757365722c5e73656c66eb90"}}]}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x220}) accept(r0, &(0x7f0000000180)=@alg, &(0x7f0000000000)=0x80) symlinkat(&(0x7f0000001080)='./control\x00', r0, &(0x7f00000010c0)='./control\x00') [ 1135.057553] XFS (loop5): Invalid superblock magic number 07:04:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:35 executing program 2: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x120) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726fa9cf598ecb9a09df6f2f805b39773f466b746d6f64653d3030303a3030303030303030303030303030ae0b3d6b73907a8e34303030302c757365725f69643d889f2084c214e295e5b59f3c17061c41344b0de5e5e7e402ec8cc6f7653009eb1acee8de152aa990a3c4ea698f43b3391beaff422cabe6a0f389af85db8397b99b0db9d77aeefd5502c8d445863e6e83926235452d14c04e6ae805d7905e56369926826269a7753c656f4857d5667a2168b22134b944114e61fad80d7ad46fb4e107963523830f603f9ef0aa429ac5065ea7fd071de217104700b0013cb84cee67e1d6a216570aa89045d36d922448c2e8ba364327b5408b785353349a9670928393d05f97c54c06485a97582e0e64fae24c251dce48e6dc054e0e37adedf56c4ba8a6612b8bc848151774e4f49d62cab7e220fdeb1d4be3b4b37125bf3c1885b1ef680f464e2ba77ec0038b3b6823fafcaeff6b20468481386eaf1f488161889d6e6e9662a791880c608b289d2b1e3cae0d80bad74c18ffc30e1f0ea42dee1551a1b502a0b07c65dd95a2b84dd1281b38c55ae4bda44c83bfb511cac5bff31e0d03982ffadcd2d2875be9c80db51ac97076091ea9a5ef7966c398a4a00ea7b23636549b7e7c71b48e6e909eaf8b37658846e8fbcf499ac2acc4a90f9e4cbacb81fc34b8dd2407c93e91ea4e4fd6531c5ddee3146be957aafde4c0988b4512bcdac3ec175680a815624df236c0a83298346826e7b1514e82d3cf5ad1c1795f7b7c7b1b088a66cbff1336ed", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000002000), 0xfffffffffffffdd9) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) r2 = semget$private(0x0, 0x4, 0x4) semtimedop(r2, &(0x7f0000000040)=[{0x5, 0x81, 0x1800}, {0x3, 0x8, 0x1000}, {0x3, 0x1000, 0x800}, {0x5, 0x0, 0x1000}, {0x3, 0x0, 0x1000}], 0x5, &(0x7f0000000080)={0x0, 0x1c9c380}) 07:04:35 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caaef", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x800000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:35 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0xcc) [ 1136.286639] hfs: unable to change iocharset [ 1136.336447] hfs: unable to parse mount options [ 1136.504118] hfs: unable to change iocharset [ 1136.554784] hfs: unable to parse mount options 07:04:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4703000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:36 executing program 0: mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4003, &(0x7f0000000040)=0xc, 0x7, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 07:04:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x8800, 0xc0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x5) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:36 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa0d", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:36 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0xcc) 07:04:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1c00000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7a000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:37 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa6a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:37 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0xcc) [ 1138.207812] kauditd_printk_skb: 164 callbacks suppressed [ 1138.207828] audit: type=1400 audit(1537945477.934:22474): avc: denied { map } for pid=6066 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1138.403375] audit: type=1400 audit(1537945477.984:22475): avc: denied { map } for pid=6073 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1138.639662] audit: type=1400 audit(1537945477.994:22476): avc: denied { map } for pid=6073 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c800000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 1138.887044] audit: type=1400 audit(1537945478.024:22477): avc: denied { map } for pid=6066 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x2000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1139.124264] audit: type=1400 audit(1537945478.044:22478): avc: denied { map } for pid=6066 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:39 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa00", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1139.369968] audit: type=1400 audit(1537945478.064:22479): avc: denied { map } for pid=6073 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1139.552976] audit: type=1400 audit(1537945478.084:22480): avc: denied { map } for pid=6073 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) unshare(0x24020400) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)={0x50}, &(0x7f0000000400), &(0x7f0000000480)={&(0x7f0000000440), 0x8}) 07:04:39 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0xcc) [ 1139.704401] audit: type=1400 audit(1537945478.294:22481): avc: denied { map } for pid=6076 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1139.860547] audit: type=1400 audit(1537945478.314:22482): avc: denied { map } for pid=6076 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1140.028213] audit: type=1400 audit(1537945478.364:22483): avc: denied { map } for pid=6076 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x48, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x3, 0xa45ffcc, 0x8}) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x101, 0x0) ioctl$TCXONC(r2, 0x540a, 0x401) 07:04:40 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caaef", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:40 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0xcc) 07:04:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)) 07:04:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x700000000000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:41 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa40", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:41 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xcc) [ 1142.140270] XFS (loop5): Invalid superblock magic number 07:04:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa002000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:42 executing program 0: r0 = gettid() r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'vlan0\x00', 0xd806}) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000480)=""/117, 0xffffff55}], 0x1) r3 = dup3(r2, r1, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000100)=@ipv6_getnetconf={0x14, 0x52, 0x50d}, 0x14}}, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x15) 07:04:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3f000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:42 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0xf000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1143.232044] kauditd_printk_skb: 181 callbacks suppressed [ 1143.232060] audit: type=1400 audit(1537945482.954:22665): avc: denied { map } for pid=6155 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:43 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0xcc) [ 1143.394252] audit: type=1400 audit(1537945483.014:22666): avc: denied { map } for pid=6155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1143.604235] audit: type=1400 audit(1537945483.014:22667): avc: denied { map } for pid=6155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1143.769660] audit: type=1400 audit(1537945483.074:22668): avc: denied { map } for pid=6155 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x2000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) write$FUSE_DIRENT(r3, &(0x7f0000000240)={0x50, 0xfffffffffffffff5, 0x7, [{0x2, 0x9, 0x8, 0x0, 'vboxnet1'}, {0x0, 0x0, 0x2, 0x4, 'fd'}]}, 0x50) [ 1144.007575] audit: type=1400 audit(1537945483.074:22669): avc: denied { map } for pid=6155 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1144.203293] audit: type=1400 audit(1537945483.214:22670): avc: denied { map } for pid=6159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:44 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x79614dd4, 0x2) [ 1144.395803] audit: type=1400 audit(1537945483.234:22671): avc: denied { map } for pid=6159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:44 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x12}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1144.555363] audit: type=1400 audit(1537945483.264:22672): avc: denied { map } for pid=6155 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:44 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0xcc) [ 1144.734302] audit: type=1400 audit(1537945483.264:22673): avc: denied { map } for pid=6155 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1144.914295] audit: type=1400 audit(1537945483.274:22674): avc: denied { map } for pid=6159 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x6000000, 0x15, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x14}, 0x14}}, 0x40) 07:04:45 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:45 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0xcc) 07:04:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe801, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:46 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}, 0xcc) 07:04:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:46 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) perf_event_open(&(0x7f0000001000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast}}}}, &(0x7f0000000000)=0xb0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85513, &(0x7f0000001000)) 07:04:46 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x6}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000005c0), 0x1000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) sendfile(r0, r0, &(0x7f0000000080), 0x800) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000040)) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x14, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:48 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) perf_event_open(&(0x7f0000001000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast}}}}, &(0x7f0000000000)=0xb0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85513, &(0x7f0000001000)) [ 1148.259863] kauditd_printk_skb: 159 callbacks suppressed [ 1148.259880] audit: type=1400 audit(1537945487.984:22834): avc: denied { map } for pid=6226 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:48 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0xcc) [ 1148.497711] audit: type=1400 audit(1537945488.034:22835): avc: denied { map } for pid=6226 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:48 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x8}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1148.672866] audit: type=1400 audit(1537945488.144:22836): avc: denied { map } for pid=6226 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1148.871991] audit: type=1400 audit(1537945488.184:22837): avc: denied { map } for pid=6226 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1149.028360] audit: type=1400 audit(1537945488.194:22838): avc: denied { map } for pid=6236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1149.169322] audit: type=1400 audit(1537945488.214:22839): avc: denied { map } for pid=6236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1149.313776] audit: type=1400 audit(1537945488.264:22840): avc: denied { map } for pid=6236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:49 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0xcc) 07:04:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1149.511097] audit: type=1400 audit(1537945488.294:22841): avc: denied { map } for pid=6236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x4) r1 = epoll_create1(0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000200)=0x14) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) [ 1149.702185] audit: type=1400 audit(1537945488.374:22842): avc: denied { map } for pid=6236 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:49 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x4}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1149.917934] audit: type=1400 audit(1537945488.454:22843): avc: denied { map } for pid=6236 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) ioctl$sock_ifreq(r1, 0x89da, &(0x7f0000000040)={'vlan0\x00', @ifru_map={0x7, 0x4, 0xfffffffffffffe01, 0x100000001, 0x0, 0xfffffffffffffffd}}) [ 1150.224112] XFS (loop5): Invalid superblock magic number 07:04:50 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0xcc) 07:04:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc4, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={@local, 0x0, r2}) 07:04:50 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x3e8}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:51 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0xcc) [ 1151.872901] XFS (loop5): Invalid superblock magic number 07:04:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x37a, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1d, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1153.335296] kauditd_printk_skb: 190 callbacks suppressed [ 1153.335312] audit: type=1400 audit(1537945493.064:23034): avc: denied { map } for pid=6328 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1153.524718] audit: type=1400 audit(1537945493.064:23035): avc: denied { map } for pid=6331 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:53 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x3}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:53 executing program 0: mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000340)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) sendmsg(0xffffffffffffffff, &(0x7f0000003880)={&(0x7f00000023c0)=@can, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002680)}], 0x1, &(0x7f0000002840), 0x0, 0x11}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x1d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1153.702299] audit: type=1400 audit(1537945493.064:23036): avc: denied { map } for pid=6331 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1153.875272] audit: type=1400 audit(1537945493.114:23037): avc: denied { map } for pid=6328 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:54 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0xcc) [ 1154.049052] audit: type=1400 audit(1537945493.134:23038): avc: denied { map } for pid=6331 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.162719] XFS (loop5): Invalid superblock magic number [ 1154.216716] audit: type=1400 audit(1537945493.144:23039): avc: denied { map } for pid=6331 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1a000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1154.431723] audit: type=1400 audit(1537945493.214:23040): avc: denied { map } for pid=6331 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="900000000000000002000000001e0000820000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc53f9f71e77526370757365746367726f7570246367726f75701500000000"], 0x90) [ 1154.616677] audit: type=1400 audit(1537945493.214:23041): avc: denied { map } for pid=6339 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x25, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1154.860500] audit: type=1400 audit(1537945493.214:23042): avc: denied { map } for pid=6328 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1155.032203] audit: type=1400 audit(1537945493.224:23043): avc: denied { map } for pid=6339 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:54 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0xffffff1f}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='.\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="400000000002000019000000dc0100002c000000010000000000000000000000002000000020000040000000000000003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota='usrjquota='}]}) 07:04:55 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0xcc) 07:04:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x32, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="e283a5a11e31960fae3baf935000146d8ebcf65aed0267c8e05aec6bfe67c0bda5ac32d049afb92c0104dccf7695bffb6d04f15f6516cad8e64c7b1f52ec494e177eba7d980b567ba6db605046c059373570c4fd8016f20bb5f31977ddc4f323", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x8, 0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000005c0)=""/218, &(0x7f00000000c0)=0xda) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000210000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 07:04:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:56 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x4888}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1156.604350] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (2 blocks) 07:04:56 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xcc) 07:04:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) clone(0x200100, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) readv(r0, &(0x7f0000000180), 0x0) 07:04:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x17, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:04:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c63efe535dc0c0747c7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:04:57 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x2000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:57 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0xcc) 07:04:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:04:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x28, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1158.377018] kauditd_printk_skb: 164 callbacks suppressed [ 1158.377035] audit: type=1400 audit(1537945498.104:23208): avc: denied { map } for pid=6412 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1158.549214] audit: type=1400 audit(1537945498.154:23209): avc: denied { map } for pid=6408 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x4400, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) close(r2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r3 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x7, 0x18002) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r1) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) memfd_create(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x6) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r5, 0x40045731, &(0x7f0000000040)=0x9) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f0000000140)={0xd000, 0x2000}) [ 1158.773768] audit: type=1400 audit(1537945498.174:23210): avc: denied { map } for pid=6412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:58 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}, 0xcc) [ 1158.961643] audit: type=1400 audit(1537945498.184:23211): avc: denied { map } for pid=6408 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:58 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x1400}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:04:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1159.174241] audit: type=1400 audit(1537945498.194:23213): avc: denied { map } for pid=6412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1159.355010] audit: type=1400 audit(1537945498.194:23212): avc: denied { map } for pid=6417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1159.548790] audit: type=1400 audit(1537945498.214:23214): avc: denied { map } for pid=6417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1159.704447] audit: type=1400 audit(1537945498.234:23215): avc: denied { map } for pid=6417 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1159.856502] audit: type=1400 audit(1537945498.254:23216): avc: denied { map } for pid=6417 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:59 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0xcc) [ 1160.103310] audit: type=1400 audit(1537945498.294:23217): avc: denied { map } for pid=6412 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:04:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc57199c255000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:05:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000003000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c0000000000000000000000000000000000000000000000b6ff0000000000002b73797374656dcc6370757365746267726f7570246367726f75701500000000"], 0x90) 07:05:00 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x806}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:00 executing program 0: add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140), &(0x7f0000000400), 0x0, 0xffffffffffffffff) r0 = socket(0x40000000015, 0x5, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) 07:05:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1e, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:00 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0xcc) 07:05:01 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x700}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x5, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000001c0)=[{0x1e, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0x30) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000000)={0x0, 0x9, 0x60, {0x0, 0x989680}}) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x2a, 0x100) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000280)={"6e60740000000000000000000000000000000000000000ff00"}, &(0x7f0000000180)=0xffffffffffffff7f) 07:05:01 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:05:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x30, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x32020000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:05:02 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0xcc) 07:05:02 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0xd}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:02 executing program 0: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a40)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x310}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)=ANY=[]}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r3 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000001c0)=r3) r4 = open(&(0x7f00004b8ff8)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000000)={0x3, 0x6}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000008c0), &(0x7f0000000940)=0x8) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) bind$can_raw(r2, &(0x7f0000000080)={0x1d, r5}, 0x10) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000009c0)) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000200)={0x0, 0x100000001}) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x7ffffff7) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x4) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000500)="0da1c3b42bc6d3f60804bf7601ae35ead13bc6860a071ce95a39ad891fc2fd7e8e5381", 0x23) 07:05:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x9, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0xfe72) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) pwrite64(r0, &(0x7f00000005c0)="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", 0x1000, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 1163.444524] kauditd_printk_skb: 141 callbacks suppressed [ 1163.444541] audit: type=1400 audit(1537945503.174:23359): avc: denied { map } for pid=6490 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1163.586504] audit: type=1400 audit(1537945503.214:23360): avc: denied { map } for pid=6490 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1163.769123] audit: type=1400 audit(1537945503.444:23361): avc: denied { map_create } for pid=6499 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:05:03 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0xcc) [ 1163.928436] audit: type=1400 audit(1537945503.474:23362): avc: denied { map } for pid=6501 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1164.059985] audit: type=1400 audit(1537945503.484:23363): avc: denied { map } for pid=6500 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:03 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x34000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x27, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1164.283173] audit: type=1400 audit(1537945503.494:23364): avc: denied { map } for pid=6501 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1164.445875] audit: type=1400 audit(1537945503.504:23365): avc: denied { map } for pid=6500 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1164.659711] audit: type=1400 audit(1537945503.524:23366): avc: denied { map } for pid=6501 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1142) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) bind$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0x2711, @host}, 0x10) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="90000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc637075736574636772557570246367726f757015000000006327f09b85527a42394c684c90a13356c768e69daf20c5efbc83982bfee78ef45048815b4bf91dba29e7ad337560802de11c403c724f32d4ab889f13326ef0"], 0xcf) [ 1164.822329] audit: type=1400 audit(1537945503.544:23367): avc: denied { map } for pid=6500 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1165.057694] audit: type=1400 audit(1537945503.544:23368): avc: denied { map } for pid=6501 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:04 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0xcc) 07:05:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x9, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:05 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x7}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5f5e0ff, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1165.792464] XFS (loop5): Invalid superblock magic number 07:05:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:05:05 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xcc) 07:05:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x9, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x17f, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:06 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x4000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x80000}}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 07:05:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x9, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:07 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0xcc) 07:05:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x12, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4e00000000000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:05:07 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x8100}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x9, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:08 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0xcc) [ 1168.460312] kauditd_printk_skb: 156 callbacks suppressed [ 1168.460329] audit: type=1400 audit(1537945508.184:23525): avc: denied { map } for pid=6583 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1168.669563] audit: type=1400 audit(1537945508.234:23526): avc: denied { map } for pid=6581 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x480, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1168.868903] audit: type=1400 audit(1537945508.244:23527): avc: denied { map } for pid=6583 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1169.049588] audit: type=1400 audit(1537945508.254:23528): avc: denied { map } for pid=6581 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:08 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x608}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000080c0), 0xfffffffffffffe05) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000480)="42e61944325549c23874b30fedb3e646307901a76f2035c12830d6193990d5a1714ab6fa976626fbe6cca1760a0357f01f5f63e9a10d8e882067452013e8faf2aeddd670ebafd63a398a121f009b845935e69bcccf34e46e5700c7c44b1be1c061a0366e955c6002e3c5f44020ed1452df7a1adf2e28fc3f91c5611dae7d174b3418fbecc1bea9841690731503d74e42a90b75ce24da31b22afeaa209e2d0578632d43e515e99038e974ecbb753cc93c3edfcbd8a1814cd14aa58298cd376212fc4de7d12b064c292729e25f6549cfab38b9d7a1d6c9a4564d0cdb95cdb30cc9137cf2d64671", 0xe6}, {&(0x7f0000000040)="036d1bd8ec645e2a2462705d424a105b0645ed2a6b4a89d91676fef1b7929f7219ce55bfc71f79b34e5c9a402c0b00cb5fd7725ffa0359dbed775304815ff91dd8b92819ec55", 0x46}, {&(0x7f0000002000)="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", 0x1000}, {&(0x7f00000040c0)="dc87d03c2eee8a7d8c3b08d535a31c1b5d41daaa984a03c98024a436e5bad9027938c90593a562b37a8540e21c5ee3ca06ac06fb2c2f35eac227ea684b5f4a833feaf825d9a4c73e7a1fab4cd254e27744513a94f003fdb7878a13f27c39894d2dc19eb23abaf45f88efcd06074f2b5682597ca877e6f6de7a94f98a0794a5148053163528cb42bc84fd840d00a30ad9c6bb6254adbb428a29183bf22816fbbd3db850dff13e0ccc9abc4643b97be2935ea394f4655623034eff01394abdf998030b522e7562e3030a7edeb5711e49d5fd10250b3c7fe5eb9f059bd1f2d2f9d1565d9d8f0f78eada7d75cce1aab48cb6bfa4601d05cf53df052d1e3db0e4a041bd5c7afae6d84156e0c8b7f7bca1009b4a33341dcd1fd81263559b820f847d1764246fdce79498d9e918a55c56fa8c06a1a6c20f58a449460b270893a21e870b741c9592a832c43d17e52753b3e50b374d378d5f9fe772d8b6550a9cccff008b9dc65023af39604f729030507ad25fab13b7845af41cfbf205d4dd518314bece238f07c43c46747a4fdfa76a3a6eb1f86dff12741bd51e2e0db808a8716932a251f89cf4697c94496577baa55d6f928fa734e67b7815fd046c67e90f2a03645815f57b5197cef148470fa4af71891fcbb398bec510d071f7bb75d6dcedd5dd87ce47ce98830234237decb748b97500ef47023361e9820dbceb18a3ba85a8cd4b6c1b0316c0b8bf543716365af8899dfa30dc001bbd2240f39c37f9c6377d5463b0d4e251e2618bd6debfd12d99f7841e32c422a0b02fb8b60f1323b6d7b93fa78edc6676585db43aad14493afa937785f67a604069a7a5d84f807073df18e8e7be1e73bb4d2965ff13bf2a3f3fe81a5ecd7870e96db303e17316c7150b54d5d8e4dcbc180057d0767746b6f9af67dec47a2a8a34f4723036a13a47f3ca85f2f1e26624eb18e313984db905dbfd54e076f38c8d8cf766331bd4786a36dfe7bdc05146e721366d7486f43a6df15e5659e6b1929ef2388ead6bdc419aac44169ea01fc9cde790538cf5f43f82d680f8afa342309b7c54c58c5d3cb8dee05fb5333da898e225a0f64ea779325b5d36673c2bef000f696de3bb0e53384f8017f221a005830a767da1254b727bed6ae480525174d6e01ed1c84d2adc7991c30093c9da7bd05431189a09362cdbf4cd6b636fff4ceefa6b46ab3db968cc51fa1e9ad534e271754618abfe86a007772d14e0b4321af23c40db263bc854af4139c3bdff7e833d54587d058dedf919731d10975b767fa7ec15bc4a9ddb9d7fda5818367252e010bc3266b8b0471bc98dfbd9d5bc3f286fc5c4d28abccaed5855d1dafedf7e3d44af3dc658b6a6ac04c8e5083f92d078d6a0dc3d325f7a5ad18bf0051c247d75b956da38ad08fd4a83abd51af50f0c9f313ee9bcaf819aaefce8f43fb29a019cdf2404f8e80ff1d5f65e3c50f144da728e135a3a9efabb0f634186619abf52216b52a7385e2b031df7e8c10a37bdd439c4481b46ee98e0c14857db40c2082198436e642005ebca1794c24a39018211ddaf323eb32557f54fd096797638aedb1b5005ba2405ff74d09f274a83bb940611e38c3369599f9bbe9acdaeaa68436507fc441fa266fc1a8726dddb3147dc3243a5dd048835bc9c001ccf4ad64f3fe953e51d447270854befe7bad4ec8fbc69cd405026da0c90ffc88c3c6d13c1bd7a5e9b2b13ee378acf89179795b9f45dadf6ae2d1df1ca3929bd731ad33add1877ad35eea1330da8d6c010ca3a58e3e19fa700ed4a4d68e3aa379277765a0ce6f172c41d56ccd047cf53b3d8e5481f298e8d2a6b1c6b2c04e469402d3d230db295215aaf49c7af24eff57c54a0ddbb8171e4bf5d8a36e5c90744b7a32cd8a9d7dd9e06acd96ed3e38d20431ed8d3f0664b5134bfc229ac632783f67421006c3e2aa9c0d4d23402cdd027aa2dcce1b2649edc2bb9729edf1353ad201f3e3ca55c9a891b5909d58fa41116ab04b22ffdbab83be81b15e7f091d89419eade6efa22580297d6f69f916ce878f5e93bae464f8bd84d5164f0b02aed1841e1d86fc1c49eda438769d1d99231073fb9504dc8f4d86d9adc06392affdf7fcb505b53b973e0ea4b07ab237eb7324230912a6b9554981e994aabebd1e946569a69e271ca36c1af64335303fdb0ff73c48d504c174c0f613888efe1889a3427a985b2e4279e66d23d67327421d2b0e93226367db6de2a6cc236ed7b27297ec0806d59bc0238f72b3b9a96373ee2148bf08dbe22e7b5760edcef6888ef6e928a08375e8a6df1032a7639b7ab399e391ee132c5134447b1b9bc1b0f702fbedc3369318e66a00585092fd2f1d0c9e3314b95e12a76fa79955ed237a0f86d70655a6d864575371e53fba94c3b1ad3bba96c566423dff10b000735d58a1bf686bbb90e6f60745d226adbdd077669f024fa8c3f8c659404c7d5816677f0c2707450cbd4ee63b9912dfcd5b1b97f6d354487055ca682a32fecb685c7508fe1df1bb84e127b677aaa7ea77e3cdebd1c701cd92e106e55722d330402008a0d5f94fd788baf31a1120a92abab8d4b76276b58244cbe3e3fa641d49415005b58fcad4b8f2403056013952d8c5f5a636afa24fde98f8bbbc53d9da1e0f71885e7ff1be81aa60366e7cb09d9283b2c33bc39d0bec14562ed807eb4fb7f2d9692a5e3af1e07794b1f55d3c6da680b6905e3be951eb35987090e49e712e94567b908d799d127e9eec2b9d34dd8189c0baca573dcfb90a978465935dc837088ba6c76e87efb3e9fe17864901e1cb5c0dc07098ce9c6ae66e6db5013d8fbfe95944fa5567d44d11bac7dc90bf19e51f1da704d7f67828afbd0871d61744968e4f0c6a170fe0ed9a1ef3b157cc688ef4d5cbdef204dc894ad384d29adc93657f4d0a0cf6d475e351b10e9dd1736cc0e48896a5ce6f2c604b745007f6907e2ff45879385a1274ad8ef9d1a92f81a21bee01cab7ed7b4df8dc0b52e71f6682d4c26aa064e3ce46b5383f86e2c90735f51442a6c88e5af1b5cde3453b3ff17183a60c31b1445d405e56bca14d2a71c1acebd94c806c7b65f0739a0819c0cb1f0462a4256810ae814df34c6e1c61182df3d24dffdf047baad5d1776ade5a089c4e6f48c733594e16e8598e1d7d0c627dfade6c17217af87b7191fd1a78ba9d7cfd571dbeb78394bc5f917987542f1185e052d6886206f39af8f66fcd7f4c38486fd24287b69baefcddcf88116fc557fc74511302ce1742ba87b2f06131b0688c68f2422e7d9e5a70981a21c98c186cf341134fc460abf9142ea74a7757ee1df0b4d75c07a2dcd5b4291d8a6a9ba109703b7b0ff0701bae5ae4f35961fbec1e5d0a78630ab8d5ef26c2ea03b1ca81c750fab89046722be59bd9964f24ee05ac4786152cf37cc1de228a70b10d565bd91c2c4c8ac3a437f9ef851a4aa0abb137cb02fce18edc5b31245840a3f009532393e50a18eac51a507d2a46aef8c1e64b262d656aac7fd0c30d454607e5e78ee79b2ff122848ad0552a3b4e785615584c2a70c43786656c6cd8f30653e277a518440da3e77bfaa0e58fe1e8121a7be2a0302a36ce7715dba4161987e29b6ab419b9d2308d0cdee45b67f77553edb4cd8d8ef4f007ea6155f6f69475da86aa339223e876c2c2c74c2ac566f687e6dab9a82cecaa684a29c8803625d97f270806f8030fd28e50df9944fe53e6260c40a2e5affe7a877a07700c9bf503f70ab9c8449d41d044420cbda26861a67ee65ca7252cc047b2ad4d56a1c8ed8a94dd0651726d2c0ebbc2b1ebee3e6e0ec0c8f3f6d9f91084c5c31db6aca76e8efbe3c02d5353b914b7a96c47993a0053938b1f6fe608664fba8dce835105b569cd81c1c92c304a600c233adad278cb288b4315d9007b413c22e3c8e810a380f7ffc5709719f9164a10c7f2d0d26d5c8d0e7db332c42cb6b1d95f8c993223733e563e7b841094127836ad8b817689f780f2b0e5734058292af7c0561d0b33b17582c0fa273b886d6117395569c168989180433147b08f7af6358a466bf88a66e07ddc05ec4f887fc322ca512d63793c95a6fe63405f67d5425a34fc8e9622cdec0785d198af6a01018d55814a3a845ef56528bb2254bd9f940eb1e0573e3a8293700afec9aa7640101c2349466ac0702801fcbb2442374478065e9f8790175bf8695c6a0d670574207535decc1191aab7e0e7dfee8a6dcc2c1f707f5b7e5c2404156e1ce6b0e0b0f6963ca9b41f3a9c048ebb977e00b255776388e508fd5ce97c35e1aefef52cb7dbffd71bc2d795cdcb989b86b8622cf607c8ed1334052aadf08d17c0d6d6a936cf9c9e69ed165c6a22371814b6ba3df97d14b67e4e8ebbcfff76da4fcd1e70495baf8290bb47468229dba8293651bc5c94e78ca5c242b47eec7407f8498bbe336272203b2bebea6278fae9cea61c69cf3e4a38a5f5337d011f3101a27d0a2198625f392947e69d9821c9bc435f27946a08ebfeab7840cefa397c1f6c4d463d346256d5fe1b1c95311a8a4ab4a6e69710a86a35fbd97c9099ff4f19f3b3275209d2d8e5f7e485f3fd71f4aa0f5fbd55800b9a7cb5db68069591c2aab0148bcc4e106e2c3e21c3e00292ea6205420381287393d3834b7cfcc530d1950d09eb3cb1013a1574d3376b5baa4539e878e805a17d9f1d8db86a4624b9bf58c8da0c1b31bda13534ac6e058e318bac87b6df3cf8e14d6b21cae2cbc637a408e140f6f4adf5905f8140b759e44b429cb340486fac7c4f687aa16ec83e71ff5c3f333f67f66d5cea6d782f9f418d5a374abc7642600cb20ec96d5f6f18c8a7667ddf3a2ed1f5dbc5ca2c7f2b0df3d01674f2d5235c9022a556348b98132af2c3e38ee784f5813241587cd0d9508a7cad571cdcc13369ecad41f6957375bee68027043f565a3362bb535f52b93630eda25a532b0ca46417c5649e1753eff507d642aec9be671d511bc6e05fb6fbfaca7dcd04d22b604cc24e736c6c4673729de93bbfc843913496ed19ee1bfd24d72d9cb95f312fa4c76fd9ad14ea9353b506af474f8e6c3626b36dd9af5a04fe15a18f474347d837512e2080a3088219a39fa883489790338f1df71f41058ec054e33b76e1f34c6c018e85687e9da0d61a3ce18ba86cf03b9c436b2b42472c93d70d76049150256fcf5a601e62a2cd9fde952b1e1165ad020cab2bebdfc9b9815fd0cc2d281d239bf6ac5a0458e83f2a84de1fe383632e8efc12c3509d8b0dc1eed31c0a353b3429ed0dd803ab214fb5d48274f6e2cb1033a59a27d92dd107fc70a8b526436dfe94947c18a096cc53c86742802f5484b36ef39d311d4b2baf75b9b15b256a4323c7530c0c9407bf49e0681a26cb1342068db722c0599001ad50fdcd52801246d8fbfb7a82b6968ea5ec63e1215fe0a13af28dad67ce2308e805586f05fef4a50e77c093693941a5efa6b0b061a3c31f85e8a57d5c5244830b24f415a4fa96c9c013c76291428c4dcacfa1e9e035521eb45da626f358afe9f95b1b44156a73be1e7dcab9d12395886be6433fc65010bc91d311048f1c7c78210f2b7b2cd1ed5e5e8e5f67dce6deab8ff13558b20d142cbb293c463daacba2cc8a6d1181502be30f9ace648d64cf65c97fb14b124f399d319186c76b40333a62cd101bcd316d253b2ce5b45395289ce9c0a3e7168460724fe4706a36352fb1da57988db772f487d14391a8f37598e33eda687d94da1cff38a4f9a4547974d11fd46d156143a7d475607a6464b6ff13875c478de456bf78911c6", 0x1000}, {&(0x7f0000000700)="2094fb4e6ca163b747aed55af0a5311f5d576f8ed0d2ea1a4b8b31c1bc8ec5a4998f8a1ea613e8d7675fe7fd2bae3f0b8ce9b068db2ed4154b2ea5af4aaa47c8f5e896291ed4e934f7681c37bbd8fc40833334dae51ba8b64e8dfe445212893807d9a867197c2770997e8f3e301318532150e81d4aec40e65798d81edac56772dfc6d7bd4d460cfa4005088cca7b1bebc387c78e6b75ead39cd2c1eabee299fcfbbebf9907d274fb3af6efd00fbf6e5ddf2f0da41623b29ee970a3747d81190235ee22e49a170044e91940e3690ca6e8f1d6eec5f35b8714ae62306dd666", 0xde}, {&(0x7f00000000c0)="0a6a52dad7477ca15412925b2d1a80", 0xf}, {&(0x7f0000000240)="6e466d20c541eb8082afa923d9287f71ff804fcb437c4be0d3588776754be6d182c295a359ff93e5c493c4b605d1184fca29e68541bf7ec7a7f27d5805208e2e919f4980990b87c7c3", 0x49}, {&(0x7f00000050c0)="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", 0x1000}, {&(0x7f0000000140)="a2fcad3abb7f7ce6a18de777a3f67add0cd25d62a99c46055fe17cddf7c29d30e5da4c5fd162b5d07356ac04eaa25d760a0b80", 0x33}], 0x9, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="fcd6754f336af461aa1ee0fef690000000000000000200000000000000820000000000000000000000000000000b00000000000000656d316e6f646576656d310000000000000000d00fb4a8c1a0aa26000000000001000000000004002c0000000000000100000000000000000000000000009ee7dc95913dcf6c6d8cbfb300001c000085b7ab511fc1dfa194ab6a07f86a8900000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000a7a0d81af8d51b84e755353a0507ff6ee2c72297d9c8aa21bca87e7f29a1ea6b05ad232e2c4772a6"], 0x90) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) [ 1169.296352] audit: type=1400 audit(1537945508.314:23529): avc: denied { map } for pid=6583 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x9, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1169.523898] audit: type=1400 audit(1537945508.314:23530): avc: denied { map } for pid=6581 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:09 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0xcc) [ 1169.697895] audit: type=1400 audit(1537945508.334:23531): avc: denied { map } for pid=6581 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) [ 1169.912006] audit: type=1400 audit(1537945508.334:23532): avc: denied { map } for pid=6588 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x44, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1170.166256] audit: type=1400 audit(1537945508.334:23533): avc: denied { map } for pid=6588 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:09 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x4788}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) [ 1170.359839] audit: type=1400 audit(1537945508.344:23534): avc: denied { map } for pid=6583 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:05:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x9, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:10 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}, 0xcc) 07:05:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x26, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x82, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 07:05:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:11 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xfffffffffffffe75) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local={0x1, 0x80, 0xc2, 0x3580}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 07:05:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x42534658, &(0x7f0000001780), 0x0, &(0x7f0000000200)={[{@sysvgroups='sysvgroups'}]}) 07:05:11 executing program 1: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}, 0xcc) 07:05:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 07:05:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) [ 1172.787837] ------------[ cut here ]------------ [ 1172.793140] refcount_t: increment on 0; use-after-free. [ 1172.798943] WARNING: CPU: 1 PID: 6654 at lib/refcount.c:153 refcount_inc_checked+0x5d/0x70 [ 1172.807357] Kernel panic - not syncing: panic_on_warn set ... [ 1172.807357] [ 1172.814743] CPU: 1 PID: 6654 Comm: syz-executor3 Not tainted 4.19.0-rc5+ #33 [ 1172.821939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1172.831298] Call Trace: [ 1172.833906] dump_stack+0x1c4/0x2b4 [ 1172.837554] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1172.842769] panic+0x238/0x4e7 [ 1172.845980] ? add_taint.cold.5+0x16/0x16 [ 1172.850157] ? __warn.cold.8+0x148/0x1ba [ 1172.854274] ? refcount_inc_checked+0x5d/0x70 [ 1172.858810] __warn.cold.8+0x163/0x1ba [ 1172.862715] ? rcu_bh_qs+0xc0/0xc0 [ 1172.866291] ? refcount_inc_checked+0x5d/0x70 [ 1172.870800] report_bug+0x254/0x2d0 [ 1172.874450] do_error_trap+0x1fc/0x4d0 [ 1172.878359] ? math_error+0x3f0/0x3f0 [ 1172.882182] ? vprintk_default+0x28/0x30 [ 1172.886270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1172.891133] ? trace_hardirqs_on_caller+0x310/0x310 [ 1172.896187] ? printk+0xa7/0xcf [ 1172.899490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1172.904353] do_invalid_op+0x1b/0x20 [ 1172.908094] invalid_op+0x14/0x20 [ 1172.911566] RIP: 0010:refcount_inc_checked+0x5d/0x70 [ 1172.916682] Code: 1d 1a d6 b1 06 31 ff 89 de e8 df 83 ef fd 84 db 75 df e8 06 83 ef fd 48 c7 c7 80 84 64 88 c6 05 fa d5 b1 06 01 e8 93 69 b9 fd <0f> 0b eb c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 [ 1172.935939] RSP: 0018:ffff8801866d6ca0 EFLAGS: 00010282 [ 1172.941316] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90007f10000 [ 1172.948598] RDX: 00000000000119ed RSI: ffffffff81650cb5 RDI: 0000000000000005 [ 1172.955904] RBP: ffff8801866d6ca8 R08: ffff8801ca110080 R09: 0000000000000002 [ 1172.963184] R10: 0000000000000000 R11: ffff8801ca110080 R12: 0000000000000000 [ 1172.970463] R13: 0000000000000008 R14: ffff8801cdd75580 R15: dffffc0000000000 [ 1172.977769] ? vprintk_func+0x85/0x181 [ 1172.981716] igmp_start_timer+0xaf/0xe0 [ 1172.985708] igmp_rcv+0x190e/0x3020 [ 1172.989368] ? ip_mc_leave_group+0x4b0/0x4b0 [ 1172.993853] ? raw_rcv_skb+0x43/0x70 [ 1172.997590] ? kasan_check_write+0x14/0x20 [ 1173.001842] ? do_raw_read_unlock+0x3f/0x60 [ 1173.006182] ? _raw_read_unlock+0x2c/0x50 [ 1173.010347] ? raw_local_deliver+0x2ca/0xc3a [ 1173.014772] ? graph_lock+0x170/0x170 [ 1173.018599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.024148] ? check_preemption_disabled+0x48/0x200 [ 1173.029180] ? check_preemption_disabled+0x48/0x200 [ 1173.034222] ? __lock_is_held+0xb5/0x140 [ 1173.038323] ip_local_deliver_finish+0x2e9/0xda0 [ 1173.043105] ? ip_sublist_rcv_finish+0x3f0/0x3f0 [ 1173.047879] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1173.052994] ? nf_hook_slow+0x11e/0x1c0 [ 1173.057007] ip_local_deliver+0x1e9/0x750 [ 1173.061172] ? ip_call_ra_chain+0x730/0x730 [ 1173.065551] ? ip_sublist_rcv_finish+0x3f0/0x3f0 [ 1173.070327] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1173.076135] ? kasan_check_read+0x11/0x20 [ 1173.080302] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1173.085333] ? rcu_bh_qs+0xc0/0xc0 [ 1173.088895] ip_rcv_finish+0x1f9/0x300 [ 1173.092800] ip_rcv+0xed/0x610 [ 1173.096019] ? ip_local_deliver+0x750/0x750 [ 1173.100358] ? pvclock_read_flags+0x160/0x160 [ 1173.104902] ? ip_rcv_finish_core.isra.15+0x1f40/0x1f40 [ 1173.110313] ? rcu_bh_qs+0xc0/0xc0 [ 1173.113872] ? lock_acquire+0x1ed/0x520 [ 1173.117869] __netif_receive_skb_one_core+0x14d/0x200 [ 1173.123100] ? __netif_receive_skb_core+0x3b60/0x3b60 [ 1173.128304] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1173.133613] ? rcu_bh_qs+0xc0/0xc0 [ 1173.137180] __netif_receive_skb+0x2c/0x1e0 [ 1173.141537] netif_receive_skb_internal+0x12c/0x620 [ 1173.146564] ? check_preemption_disabled+0x48/0x200 [ 1173.151592] ? dev_cpu_dead+0xa80/0xa80 [ 1173.155595] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1173.161279] ? eth_type_trans+0x2ea/0x760 [ 1173.165442] ? eth_gro_receive+0x920/0x920 [ 1173.169702] napi_gro_frags+0x75a/0xc90 [ 1173.173697] ? napi_gro_receive+0x5f0/0x5f0 [ 1173.178041] ? eth_get_headlen+0x173/0x1f0 [ 1173.182288] ? eth_type_trans+0x760/0x760 [ 1173.186456] ? tun_get_user+0x31ac/0x42a0 [ 1173.190620] tun_get_user+0x31d5/0x42a0 [ 1173.194638] ? tun_build_skb.isra.53+0x2230/0x2230 [ 1173.199583] ? debug_smp_processor_id+0x1c/0x20 [ 1173.204277] ? perf_trace_lock+0x14d/0x7a0 [ 1173.208560] ? futex_wait_setup+0x3e0/0x3e0 [ 1173.212946] ? zap_class+0x640/0x640 [ 1173.216673] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 1173.221840] ? tun_get+0x206/0x370 [ 1173.225396] ? lock_downgrade+0x900/0x900 [ 1173.229556] ? check_preemption_disabled+0x48/0x200 [ 1173.234606] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1173.240418] ? kasan_check_read+0x11/0x20 [ 1173.244675] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1173.249967] ? rcu_bh_qs+0xc0/0xc0 [ 1173.253549] ? tun_get+0x22d/0x370 [ 1173.257100] ? tun_chr_close+0x180/0x180 [ 1173.261185] tun_chr_write_iter+0xb9/0x154 [ 1173.265442] do_iter_readv_writev+0x8b0/0xa80 [ 1173.269957] ? vfs_dedupe_file_range+0x670/0x670 [ 1173.274737] ? rw_verify_area+0x118/0x360 [ 1173.278903] do_iter_write+0x185/0x5f0 [ 1173.282803] ? dup_iter+0x270/0x270 [ 1173.286458] vfs_writev+0x1f1/0x360 [ 1173.290102] ? vfs_iter_write+0xb0/0xb0 [ 1173.294096] ? lock_release+0x970/0x970 [ 1173.298093] ? arch_local_save_flags+0x40/0x40 [ 1173.302697] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1173.308180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.313732] ? __fdget_pos+0xde/0x200 [ 1173.317571] ? __fdget_raw+0x20/0x20 [ 1173.321305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1173.326854] ? put_timespec64+0x10f/0x1b0 [ 1173.331030] do_writev+0x11a/0x310 [ 1173.334594] ? vfs_writev+0x360/0x360 [ 1173.338431] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1173.343933] __x64_sys_writev+0x75/0xb0 [ 1173.347927] do_syscall_64+0x1b9/0x820 [ 1173.352179] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1173.353062] kobject: '0:55' (000000008b207cb6): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1173.357554] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1173.357622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1173.376572] ? trace_hardirqs_on_caller+0x310/0x310 [ 1173.381607] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1173.386640] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1173.391675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1173.396546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.401747] RIP: 0033:0x457431 [ 1173.404953] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 54 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 1173.423862] RSP: 002b:00007fdfbdb42ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 1173.431592] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000457431 [ 1173.437636] kobject: '0:55' (000000008b207cb6): kobject_uevent_env [ 1173.438868] RDX: 0000000000000001 RSI: 00007fdfbdb42bf0 RDI: 00000000000000f0 [ 1173.438879] RBP: 0000000020000640 R08: 00000000000000f0 R09: 0000000000000000 [ 1173.438889] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fdfbdb436d4 [ 1173.438916] R13: 00000000004c48a4 R14: 00000000004d7b90 R15: 00000000ffffffff [ 1173.446407] Kernel Offset: disabled [ 1173.479102] Rebooting in 86400 seconds..