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", 0xfffffffffffffd14}, 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000400)=0xffffffffffffffff, 0xfffffffffffffdec) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000480)={0x7, 0x0, &(0x7f0000000300)="5a787ac0aaab1b9c945852cea20b3d2ee2bac0453d8352044510a9bcf4799162bbaa9d1bfc235c1adc8ab5ccfc1267257d1ec725c2f957f914198e4e8d70a16313c327897716f106436a9a5220fbfe25ea3cfee6d1f980d39540c023cce3eb0f656f7bbc8119a714", &(0x7f0000000240)="65a161cae49f63e71a1811c4e9c478e8b628bac377fecc709e33603e5700", 0x68, 0x1e}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000500)) r2 = semget$private(0x0, 0x1, 0x28) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000540)=[0x9, 0x2, 0x1]) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) utimensat(r1, &(0x7f0000000280)='./bus\x00', &(0x7f0000000380)={{0x77359400}, {0x77359400}}, 0x100) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0xefda}, &(0x7f00000005c0)=0xffffff17) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x802c550a, 0x0) [ 961.665918] audit: type=1400 audit(1542919935.016:254): avc: denied { map } for pid=483 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00', 0x200000000003}) 20:52:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getpeername(r0, 0x0, 0x0) [ 961.832687] audit: type=1400 audit(1542919935.036:255): avc: denied { map } for pid=483 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 961.998243] audit: type=1400 audit(1542919935.306:256): avc: denied { map } for pid=495 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000de2ff4), 0xc, &(0x7f00007a8000)={&(0x7f0000000200)={0x14, 0x6, 0x6, 0x3}, 0x14}}, 0x0) [ 962.191531] audit: type=1400 audit(1542919935.346:257): avc: denied { map } for pid=495 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.341912] audit: type=1400 audit(1542919935.346:258): avc: denied { map } for pid=495 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.496045] audit: type=1400 audit(1542919935.346:259): avc: denied { map } for pid=495 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.688360] audit: type=1400 audit(1542919935.446:260): avc: denied { map } for pid=495 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.837051] overlayfs: failed to resolve './file1': -2 20:52:16 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x0, 0xd, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "740e4b97"}, 0x0, 0x0, @fd, 0x4}) 20:52:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getpeername(r0, 0x0, 0x0) 20:52:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104fffffd3b54c007110000f30501000b0003002c018855000010", 0x1f) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2f, 0x11d, 0x0, 0x0, {0x3}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary="04"}]}]}, 0x20}}, 0x0) 20:52:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x1000000000006, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x52, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000380)={0x103ff, 0x2, 0x105000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000400)) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000440)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) r5 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$UHID_INPUT(r5, &(0x7f0000001100)={0x8, "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", 0x1000}, 0x1006) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="f6", 0x1, 0x91, 0x0, 0x0) 20:52:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x1000000000006, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x52, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000380)={0x103ff, 0x2, 0x105000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000400)) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000440)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) r5 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$UHID_INPUT(r5, &(0x7f0000001100)={0x8, "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", 0x1000}, 0x1006) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="f6", 0x1, 0x91, 0x0, 0x0) 20:52:17 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x0, 0xd, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "740e4b97"}, 0x0, 0x0, @fd, 0x4}) 20:52:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10, 0x0, 0x800000000000000}, 0xc, &(0x7f0000bd7000)={&(0x7f0000648eac)=@newsa={0x138, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) [ 964.187788] openvswitch: netlink: IP tunnel dst address not specified 20:52:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getpeername(r0, 0x0, 0x0) [ 964.277939] openvswitch: netlink: IP tunnel dst address not specified 20:52:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104fffffd3b54c007110000f30501000b0003002c018855000010", 0x1f) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2f, 0x11d, 0x0, 0x0, {0x3}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary="04"}]}]}, 0x20}}, 0x0) 20:52:18 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x0, 0xd, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "740e4b97"}, 0x0, 0x0, @fd, 0x4}) 20:52:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10, 0x0, 0x800000000000000}, 0xc, &(0x7f0000bd7000)={&(0x7f0000648eac)=@newsa={0x138, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 20:52:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getpeername(r0, 0x0, 0x0) [ 965.463345] overlayfs: failed to resolve './file1': -2 [ 965.471263] openvswitch: netlink: IP tunnel dst address not specified 20:52:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104fffffd3b54c007110000f30501000b0003002c018855000010", 0x1f) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2f, 0x11d, 0x0, 0x0, {0x3}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary="04"}]}]}, 0x20}}, 0x0) 20:52:19 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x0, 0xd, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "740e4b97"}, 0x0, 0x0, @fd, 0x4}) 20:52:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x1000000000006, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x52, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000380)={0x103ff, 0x2, 0x105000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000400)) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000440)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) r5 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$UHID_INPUT(r5, &(0x7f0000001100)={0x8, "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", 0x1000}, 0x1006) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="f6", 0x1, 0x91, 0x0, 0x0) [ 966.349379] kauditd_printk_skb: 142 callbacks suppressed [ 966.349404] audit: type=1400 audit(1542919939.876:403): avc: denied { map } for pid=557 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 966.517574] openvswitch: netlink: IP tunnel dst address not specified [ 966.539356] audit: type=1400 audit(1542919939.966:404): avc: denied { map } for pid=557 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 966.592332] overlayfs: failed to resolve './file1': -2 [ 966.660960] audit: type=1400 audit(1542919939.966:405): avc: denied { map } for pid=557 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 966.759879] audit: type=1400 audit(1542919940.006:406): avc: denied { create } for pid=560 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 966.916466] audit: type=1400 audit(1542919940.026:407): avc: denied { map } for pid=557 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.022700] audit: type=1400 audit(1542919940.036:408): avc: denied { map } for pid=557 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.142688] audit: type=1400 audit(1542919940.046:409): avc: denied { write } for pid=560 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 967.239541] audit: type=1400 audit(1542919940.116:410): avc: denied { map } for pid=557 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.392742] audit: type=1400 audit(1542919940.146:411): avc: denied { map } for pid=557 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x1000000000006, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x52, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000380)={0x103ff, 0x2, 0x105000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000400)) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000440)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) r5 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$UHID_INPUT(r5, &(0x7f0000001100)={0x8, "92a7132795fd32d0386fa86d22ec3d4f9e0c424ab27cdc8b3d12137b0de453cb1a2dae67d0fb8bca81ed9aa474b29e92059190ef5bbea2451be88ff1a5f63a7c9d24ca8ee09e48e2b02091786a7909a25a96bbfd831bcbc6676639272f6a053415fc37cdf1ed1d8031db8f5432725064c9e0bec287b7dc42ba4a9e2506efffc41fc7f3da4319a313491338aa5ebfe687274881847cf33bf2e7fb2888a02a85b162720c0356e58b89a7234a3f9522dad7cf29aa2b2701c3764ee05653464d72cd7730ce97258735ba2f469ea117750ec772fbdd7b99732c85213bad8d54d51a5eaab7ce9ca6ad70454f8ddad3d1eee8dc66cd31919876112f24e9db3e3617b53bed0e46c228a87efccee14a38ad14992b4dc7c20ae2f25a603aff5f150e397c3621357f4694ea5ee53e92075980ddcb5fa2edfc111704ee701fd4c6d5c1b8617d9ffcf9e6e5d275498e79521d9b4571fe9c9684d01f34faa711d684dae5ca17ba94354948b7f76117e1f7a311a7737f0df2fb76d5df7982f7bcfd6a9612af22eabe9771d538e5c4a7b5916687a5273c6a4c83cc750ad6f1fbef37cef3c3c209d52a2749ca9ac33ca987d415b15b376881b961652c63fd8dd23044fc9104f84c465d7766f4bbe4bae3c7388dcb852853e77cde7e7875cf3245cf34bdbb5ccb89aa3beffb44c001dc3b94a68cd5cae67958813ee40ffce34a76497d8bc7d5b99caa6e93c5d304c150181c0dbc8afc16a12d9a0a31f9051d07bd1c9d8329fd9e809d7daa71e6838cac0a8657687741bf1a2b23b8553c9d27ac1e83219d2d42ff1d7649a6d02a21ef844bdaefb360ca9a8ca1cbc5cb1760c93f14b614a6cb91391e03a6b0be1acd51043217b944a6c62219b5c7d67ffbc594829e29f472b0f5fa3e9a3aa16346d16a4403e557a1de49b141287b4e87cc93da2bdf8f44830b7de0a3d98e1612ac1352b9a11c81b0396dcd64646ce625cde56689a40fc1fb451c606b7e7df02e561a807dbeadc0982f03545d15261c3aeeab9827752d665d94ba85ed72ae6fb8c29118e37c5908de1c7a4353b1f2bd747737fcf4c436bc2e2d004f97dbcb8e413bf4876cf19994bc21eab0906cd419beecd4c7389ef8736003d86ee3185d68a157803bd83704bb3e9a9e0c65f2995a250a59af11cd4533e5bd4d5b1ec5e2f255fbea0e6dfbac5df56f1c2bdb84437b3868a1321ea835b52ee97880d579b01187f4c0dec50ef6004d54e02b646bca69baa10c28b23f3276ce53df43583beb461c14e5247ac131304ef28dc15ae18837b37a4ac0db63d7ab2d6297aa2fe12475356d9e0824b959e2621f51eedf407013e731e00efaca78a15b95048487f999b52eddc4477d6b9bb3d2a3b89c6e5e7af4c60dd09c783abb1857abde263f1bad97f172d3703fdd0694ee03bbf7ef3af67be4c3998214d2b428fca2df84197ed93c870e3a74a57c984b6e8a6469d1503d30bba53881599d359625c11936f7eee43a0d7ad18fab00d7863fe62c2b5560f6dce11726b380a86bc1769a6628b6a1e2949fe60c36eba673d209afa3c6b4a003c70152df3484b7793825ca28b9d64917094e3c2af14b3bb6f2402aff19ad7083e20b8d11c79be2ab792a4bf260c9e2163b4f3e2eb83338969bee1013fa6e7cf44183ba3c9242fde2ce5e90f2ab37a4875861d46ace0cb5538b0cf7fc234cfaa6f08d9636de1ddace00aef45870f285f02f2db583e5411284bd4722b81e3a4ed019b1f47247e6a65f0e63c89ef636a9ffdd3a987814a05d925df6a05c204eba6a3463854dfe50cf228aa06be35fd17e510928f816532431546461696f44e88564ff0a6c75c418b53d94908aebcfe74f416b87d525b640075dcec52816774b1e0a1e29b812f904d867351afa6c1a9e04cfaf9e73300930d9b04adef1deb9daa95e560bd6e201fa2163a2ff09ff3ba27f2e4502f5d94b261e4b36590f7bb925aa62d5f62304629043ae17f51899e3310bd925398cc8eafea09de914c8575853623d3b46a8ee4086796c7c583c6b31c0506e493d6ec8aa8dee5bd83e7bbccd2f7b1fbfc103078877416b82758477d29dfd0c2ee44d74fcec13db1b548f1fbddbbcefaad139de362473895210276510592595ed2e9618ec0817d6ae01f18af9d8bee0b257855853787809bfc08e4b8c017330a0a2018e71b8a9b184a9f25ac29f4191383b0906101e9cd2b0f965eef73d823b92dcceb4f22fb46910384926592e6143087957729df1fb1fb479a44f5593f8b5fc91fd2952d60b6d5538d5f15c549580b37238f644dce401acedbd75f737b3e6e565464a887d926dd12c6373d18ce0afeaea3b7733e85cb571f7734572a809e57050c7b2af6367c9eefd2144ef4328e7ba3d5f4049926a6114847af00ef935f7dc2152ded9e6fa4b752cfc031fd1c418709b1ca24c61072680a26734921746846dfcebf452c42e33abac759d254221df17bcf61410de978d056646f0e8a0f2f83ee8fff2116ebb0e78622422d38d4d6718a76a285beaebe5353ff39dc29d5f174187c1546409cc0315b6bdb19787a863bd36d8e0ab4c86aa607802624c488f71bfeebeef4723a2591ad2b18328450e9bec874e169a988fc2cdd9d6405c022d3e7da1f16c12fb83591655d6c49d10fe2d1981dffc7921f8950dc01b35c2daa59ea9ac888b1a76304863165d015d7d9bb2f052da0a623dba27fe5b17325a20cd4b37bf10f2b73a462a7a9a0eea9190b2280e2862c1b788ca9ce3e8693be2f312d8862d6d69702242b43f056234cab7578b02b30454d8fb499d4a7f2b37a69f00091b667568c96bad3d80901e20593c791c7b90004d8496724529c34659cf301b4719a484e013b07c81a1cdbe9e434bde2d3fe7d63f798bdb3767b4ce55e224fc97a4866f14b64945c324b0fbc0cc3dbc1fd8458e4acba6754e79992e8f4f9493d7470aabd5ccbf27a1feef97c03e09373a42f9cdf414bbacf46a4238c2dc4edbfbc9839f3b1fb16f3dc4be63cf181be2e09603f945e58a044219a4a062c610409ecf1b0f50b423d37d3fff1bded4046cddd9b2b399a9b748e142c804543fdfb82e8fbf06cc3a17a7ca5f48827161bc63d6c58e31aee3b35afaa41fe9647d8a46afba0b51b597c3f51fd4b9d9c58f7874c64bbf23b1455424efa2fd7b5a6b7e9d3df049fd8cd16b691bc9adf2fdc4864eeaf456dda95025201e35f3d691c86322ea6c4243afb0eb5f61424a07359cf818d68479e4ce727d1291051cbecc987842bb4f92c6b02674d6506464b8ee27a63d6c33c029bc75be70c6668be48dd712c2291bc339e10ef9da20fbee3653d27074ab933d1fbbb4644c2d0845df80603002762241ebdf63cfca24578e640b502ab6f3a234acfa250b97a47db85c256c7832246758575e4fb18e1af9d65638e96e73fed4a8fbbb9d3acd33f54161672663762ccc98a2fabc4b1163b4f44c2d9a4d7ba5b5ded6a165c9da74a33588de738efbe177b7fb44a9660c70507ae487747bb760309908cbd6905902e0f0ee9ca034171d72d34a3d28769d8805fffed9d707318e90cb5360ca8b936776e1e04d1d91d285aa054995e497509bb843dd67227b8c3012cf04fa377b884349ac86ea29afd09e03f1e254f1b532529768508883ef04456e53e69fab701120cf8f9c5e8d27b058d3a828f32723fbf05685ab3eca512f3dba1b11be77813f04e441470684eeb78d4f181e326c30e5eefac6e422cc3e5e415df981656a3e0732d925e447304cc15a7a114863446bcfbb557878286329970b69f6a32305c40007b32765a5cc7c46bb08807dc87bc4dccc228d02a0705e9db825998db6b669407ba5ecb6297c754845285419f553d5079e330705a0fa566e92e471fce0cfaea92615f0dcaa97b51a877c40eabceea90d9801fbcfc3a00d12f1d0256df4f57058df510a543eb99035c04d97978e777156f2aff853410980689714dcb32c493e92f5bba2a85bf2692a463c64849cbd2c9a5dfd237215639d761b5e27a328a915a4d54f12c2bc07212df58e6bdfb70a148bdbcec28c60e4dc11a5afb0517919484130e42c1674a1ec3b9b80fdcbc2aad7e2814eec77e4fe9cc43c0633e691b07fc2eb0bb9927c9b0ffaaed323a9a8d9408f6b9691140bed6db9f41aa4cebe21b53135473906503b2552b3cea3d7b21de0e5fbf6ea7b38164128d9f9273c312cc8f1e511020e62d072d4c0fa1178f185818e970a0af807533269eb79d44f3f00ea7a84568f2c72192d7ad6eb3bcf4c915ec8a2fc6b28c6190bb3ef3078fb87f7bbdc02da6363f6261639df8972202a4006d40cd49d38ef8c3436ea9e2438fd5851e5fa2838d7c6d00461df4e10205d9356afe26f9f291dd7aac95be0442f5a2c162f7b4eecbf134a7abbe9efa865cb9e469eaad44eeb9ac338afbdc0e2ccaa439d7c02bdaf0faaf1b762bcaaf846351069e4fa74c19438ef2e1d4e6a84f7033d321a2c2ed4d7a094cf3bc82de988d746e3d159535b42166ca0556802bac25518eb615ffb32f0a1329ec68d9d4397f6e11ca588bbf277d0a26a630dcee0614e345ce4ca3d3df00026cecf78f2175aa86212b6ecacf625daa12fb432ba7c76e3308db367bdee512854148de4fdc13793aad0a6cffdcfb7909bb038e4cc8e5ed51191667cca6211f5425fc6bc6fad40764cd488ff90dc03d354c4cf5e791728d793818279f88bc6b464d5795e3fb8198bd25ff018012dd9d21c3f9645514bf0f00c3c7cc4d34c4ac1d3f231469bca011e043aaf31761daf60205c6b8b0f5d9d5a3cf626efb4298ca42bf8f8fd545871441b99902cfa10f1182a5a4f77985e258f74a35f9f9c1d1d86a21a745ab3ee20b530d88f184fa1ea3a3e0aeb99efd01132edebb8206c161849379996e4d4e272cd6aa3c630218892d57e4443753eefbdb03e234d89b5d16719bdde05e40a9aa20b2617de32b7b422ef9dea0ad5acd9a80a2824fdc2a53e72c0ea9bdd885564245023bff94af9d1fa3f960e09a788cb805848dc05ed08041ff3b6ee630787a3417bb5f78d5c66469a28376b39c0e4abdf6d3f3db99a019e3fd4462985c970f208ae5821188d84f1921ae7cec0f3338ef71a764ce446a82e9ff200971581812098824ed4df7930fc1263cc86e161be9652f8dae13d8a94d913d6765a3cf5fe3087de601003fb8dec1818d961e397218d55c9950094b864d2d6c11d8c3a9e87b8bbb8e62385ce3ec63af5306b75559fe3494dcc5f53dd050eb434b5f9f4da42549bb0788b958d6e57b0db81e75757c6a08cb56be6a583df3032848ce000ee6e8424cd1a221dc24b490a5747da2d7068029ddf3d41430c078f55b6bed8b238bf34b1efeef97e511ee854df613f03df4218b93c3b851ef47ce9722ddd5c9ba6eb20c26175ee65c0e080d5c25d19fb32e7e8f275d79ac2ca9a5746c1f606e32cd73e54427ff62a65902679e103fb5b3f46e6d5383b0c89d67cd51ae62e74b2beb56a22a2ea1c1ce2155fbe3ba3397be210e0f6a913b450aadb41f155c39343510ffe0d9ecd62e0cd6698ad689b46b8b50c26071b5fe38afb8654a17dee53bf234f3b182828851995e53da5f301b3d18be977a9c8f562e8591a88870de762b2101fa0014e887b90c9fbb46ed59120850338e0aed7a79f7b4ab6fbfcdbd47ae4acaf38e4a74ffb13a093d1495ddedb57984d9314997179c2badf69d0ac71bc35e05f89b7cdb8cd5992aef1ca93c1a972a108d0669edaa61aea6736318c79f723d8c1b4e624e001b5407d0fbef17121d2d995a8d10084c3781b92479a92a163fd", 0x1000}, 0x1006) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="f6", 0x1, 0x91, 0x0, 0x0) 20:52:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x200000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 20:52:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10, 0x0, 0x800000000000000}, 0xc, &(0x7f0000bd7000)={&(0x7f0000648eac)=@newsa={0x138, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 20:52:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104fffffd3b54c007110000f30501000b0003002c018855000010", 0x1f) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2f, 0x11d, 0x0, 0x0, {0x3}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary="04"}]}]}, 0x20}}, 0x0) 20:52:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000006d00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000400000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000002c0)=0x9) connect(r0, &(0x7f0000000080)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x80) close(r0) [ 967.620187] audit: type=1400 audit(1542919940.406:412): avc: denied { map } for pid=564 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.928764] openvswitch: netlink: IP tunnel dst address not specified 20:52:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10, 0x0, 0x800000000000000}, 0xc, &(0x7f0000bd7000)={&(0x7f0000648eac)=@newsa={0x138, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 20:52:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) pipe(&(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f00000008c0)) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000940)) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000600)=0x98) 20:52:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 968.305434] overlayfs: failed to resolve './file1': -2 20:52:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000006d00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000400000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000002c0)=0x9) connect(r0, &(0x7f0000000080)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x80) close(r0) 20:52:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x1000000000006, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x52, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000380)={0x103ff, 0x2, 0x105000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000400)) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000440)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) r5 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$UHID_INPUT(r5, &(0x7f0000001100)={0x8, "92a7132795fd32d0386fa86d22ec3d4f9e0c424ab27cdc8b3d12137b0de453cb1a2dae67d0fb8bca81ed9aa474b29e92059190ef5bbea2451be88ff1a5f63a7c9d24ca8ee09e48e2b02091786a7909a25a96bbfd831bcbc6676639272f6a053415fc37cdf1ed1d8031db8f5432725064c9e0bec287b7dc42ba4a9e2506efffc41fc7f3da4319a313491338aa5ebfe687274881847cf33bf2e7fb2888a02a85b162720c0356e58b89a7234a3f9522dad7cf29aa2b2701c3764ee05653464d72cd7730ce97258735ba2f469ea117750ec772fbdd7b99732c85213bad8d54d51a5eaab7ce9ca6ad70454f8ddad3d1eee8dc66cd31919876112f24e9db3e3617b53bed0e46c228a87efccee14a38ad14992b4dc7c20ae2f25a603aff5f150e397c3621357f4694ea5ee53e92075980ddcb5fa2edfc111704ee701fd4c6d5c1b8617d9ffcf9e6e5d275498e79521d9b4571fe9c9684d01f34faa711d684dae5ca17ba94354948b7f76117e1f7a311a7737f0df2fb76d5df7982f7bcfd6a9612af22eabe9771d538e5c4a7b5916687a5273c6a4c83cc750ad6f1fbef37cef3c3c209d52a2749ca9ac33ca987d415b15b376881b961652c63fd8dd23044fc9104f84c465d7766f4bbe4bae3c7388dcb852853e77cde7e7875cf3245cf34bdbb5ccb89aa3beffb44c001dc3b94a68cd5cae67958813ee40ffce34a76497d8bc7d5b99caa6e93c5d304c150181c0dbc8afc16a12d9a0a31f9051d07bd1c9d8329fd9e809d7daa71e6838cac0a8657687741bf1a2b23b8553c9d27ac1e83219d2d42ff1d7649a6d02a21ef844bdaefb360ca9a8ca1cbc5cb1760c93f14b614a6cb91391e03a6b0be1acd51043217b944a6c62219b5c7d67ffbc594829e29f472b0f5fa3e9a3aa16346d16a4403e557a1de49b141287b4e87cc93da2bdf8f44830b7de0a3d98e1612ac1352b9a11c81b0396dcd64646ce625cde56689a40fc1fb451c606b7e7df02e561a807dbeadc0982f03545d15261c3aeeab9827752d665d94ba85ed72ae6fb8c29118e37c5908de1c7a4353b1f2bd747737fcf4c436bc2e2d004f97dbcb8e413bf4876cf19994bc21eab0906cd419beecd4c7389ef8736003d86ee3185d68a157803bd83704bb3e9a9e0c65f2995a250a59af11cd4533e5bd4d5b1ec5e2f255fbea0e6dfbac5df56f1c2bdb84437b3868a1321ea835b52ee97880d579b01187f4c0dec50ef6004d54e02b646bca69baa10c28b23f3276ce53df43583beb461c14e5247ac131304ef28dc15ae18837b37a4ac0db63d7ab2d6297aa2fe12475356d9e0824b959e2621f51eedf407013e731e00efaca78a15b95048487f999b52eddc4477d6b9bb3d2a3b89c6e5e7af4c60dd09c783abb1857abde263f1bad97f172d3703fdd0694ee03bbf7ef3af67be4c3998214d2b428fca2df84197ed93c870e3a74a57c984b6e8a6469d1503d30bba53881599d359625c11936f7eee43a0d7ad18fab00d7863fe62c2b5560f6dce11726b380a86bc1769a6628b6a1e2949fe60c36eba673d209afa3c6b4a003c70152df3484b7793825ca28b9d64917094e3c2af14b3bb6f2402aff19ad7083e20b8d11c79be2ab792a4bf260c9e2163b4f3e2eb83338969bee1013fa6e7cf44183ba3c9242fde2ce5e90f2ab37a4875861d46ace0cb5538b0cf7fc234cfaa6f08d9636de1ddace00aef45870f285f02f2db583e5411284bd4722b81e3a4ed019b1f47247e6a65f0e63c89ef636a9ffdd3a987814a05d925df6a05c204eba6a3463854dfe50cf228aa06be35fd17e510928f816532431546461696f44e88564ff0a6c75c418b53d94908aebcfe74f416b87d525b640075dcec52816774b1e0a1e29b812f904d867351afa6c1a9e04cfaf9e73300930d9b04adef1deb9daa95e560bd6e201fa2163a2ff09ff3ba27f2e4502f5d94b261e4b36590f7bb925aa62d5f62304629043ae17f51899e3310bd925398cc8eafea09de914c8575853623d3b46a8ee4086796c7c583c6b31c0506e493d6ec8aa8dee5bd83e7bbccd2f7b1fbfc103078877416b82758477d29dfd0c2ee44d74fcec13db1b548f1fbddbbcefaad139de362473895210276510592595ed2e9618ec0817d6ae01f18af9d8bee0b257855853787809bfc08e4b8c017330a0a2018e71b8a9b184a9f25ac29f4191383b0906101e9cd2b0f965eef73d823b92dcceb4f22fb46910384926592e6143087957729df1fb1fb479a44f5593f8b5fc91fd2952d60b6d5538d5f15c549580b37238f644dce401acedbd75f737b3e6e565464a887d926dd12c6373d18ce0afeaea3b7733e85cb571f7734572a809e57050c7b2af6367c9eefd2144ef4328e7ba3d5f4049926a6114847af00ef935f7dc2152ded9e6fa4b752cfc031fd1c418709b1ca24c61072680a26734921746846dfcebf452c42e33abac759d254221df17bcf61410de978d056646f0e8a0f2f83ee8fff2116ebb0e78622422d38d4d6718a76a285beaebe5353ff39dc29d5f174187c1546409cc0315b6bdb19787a863bd36d8e0ab4c86aa607802624c488f71bfeebeef4723a2591ad2b18328450e9bec874e169a988fc2cdd9d6405c022d3e7da1f16c12fb83591655d6c49d10fe2d1981dffc7921f8950dc01b35c2daa59ea9ac888b1a76304863165d015d7d9bb2f052da0a623dba27fe5b17325a20cd4b37bf10f2b73a462a7a9a0eea9190b2280e2862c1b788ca9ce3e8693be2f312d8862d6d69702242b43f056234cab7578b02b30454d8fb499d4a7f2b37a69f00091b667568c96bad3d80901e20593c791c7b90004d8496724529c34659cf301b4719a484e013b07c81a1cdbe9e434bde2d3fe7d63f798bdb3767b4ce55e224fc97a4866f14b64945c324b0fbc0cc3dbc1fd8458e4acba6754e79992e8f4f9493d7470aabd5ccbf27a1feef97c03e09373a42f9cdf414bbacf46a4238c2dc4edbfbc9839f3b1fb16f3dc4be63cf181be2e09603f945e58a044219a4a062c610409ecf1b0f50b423d37d3fff1bded4046cddd9b2b399a9b748e142c804543fdfb82e8fbf06cc3a17a7ca5f48827161bc63d6c58e31aee3b35afaa41fe9647d8a46afba0b51b597c3f51fd4b9d9c58f7874c64bbf23b1455424efa2fd7b5a6b7e9d3df049fd8cd16b691bc9adf2fdc4864eeaf456dda95025201e35f3d691c86322ea6c4243afb0eb5f61424a07359cf818d68479e4ce727d1291051cbecc987842bb4f92c6b02674d6506464b8ee27a63d6c33c029bc75be70c6668be48dd712c2291bc339e10ef9da20fbee3653d27074ab933d1fbbb4644c2d0845df80603002762241ebdf63cfca24578e640b502ab6f3a234acfa250b97a47db85c256c7832246758575e4fb18e1af9d65638e96e73fed4a8fbbb9d3acd33f54161672663762ccc98a2fabc4b1163b4f44c2d9a4d7ba5b5ded6a165c9da74a33588de738efbe177b7fb44a9660c70507ae487747bb760309908cbd6905902e0f0ee9ca034171d72d34a3d28769d8805fffed9d707318e90cb5360ca8b936776e1e04d1d91d285aa054995e497509bb843dd67227b8c3012cf04fa377b884349ac86ea29afd09e03f1e254f1b532529768508883ef04456e53e69fab701120cf8f9c5e8d27b058d3a828f32723fbf05685ab3eca512f3dba1b11be77813f04e441470684eeb78d4f181e326c30e5eefac6e422cc3e5e415df981656a3e0732d925e447304cc15a7a114863446bcfbb557878286329970b69f6a32305c40007b32765a5cc7c46bb08807dc87bc4dccc228d02a0705e9db825998db6b669407ba5ecb6297c754845285419f553d5079e330705a0fa566e92e471fce0cfaea92615f0dcaa97b51a877c40eabceea90d9801fbcfc3a00d12f1d0256df4f57058df510a543eb99035c04d97978e777156f2aff853410980689714dcb32c493e92f5bba2a85bf2692a463c64849cbd2c9a5dfd237215639d761b5e27a328a915a4d54f12c2bc07212df58e6bdfb70a148bdbcec28c60e4dc11a5afb0517919484130e42c1674a1ec3b9b80fdcbc2aad7e2814eec77e4fe9cc43c0633e691b07fc2eb0bb9927c9b0ffaaed323a9a8d9408f6b9691140bed6db9f41aa4cebe21b53135473906503b2552b3cea3d7b21de0e5fbf6ea7b38164128d9f9273c312cc8f1e511020e62d072d4c0fa1178f185818e970a0af807533269eb79d44f3f00ea7a84568f2c72192d7ad6eb3bcf4c915ec8a2fc6b28c6190bb3ef3078fb87f7bbdc02da6363f6261639df8972202a4006d40cd49d38ef8c3436ea9e2438fd5851e5fa2838d7c6d00461df4e10205d9356afe26f9f291dd7aac95be0442f5a2c162f7b4eecbf134a7abbe9efa865cb9e469eaad44eeb9ac338afbdc0e2ccaa439d7c02bdaf0faaf1b762bcaaf846351069e4fa74c19438ef2e1d4e6a84f7033d321a2c2ed4d7a094cf3bc82de988d746e3d159535b42166ca0556802bac25518eb615ffb32f0a1329ec68d9d4397f6e11ca588bbf277d0a26a630dcee0614e345ce4ca3d3df00026cecf78f2175aa86212b6ecacf625daa12fb432ba7c76e3308db367bdee512854148de4fdc13793aad0a6cffdcfb7909bb038e4cc8e5ed51191667cca6211f5425fc6bc6fad40764cd488ff90dc03d354c4cf5e791728d793818279f88bc6b464d5795e3fb8198bd25ff018012dd9d21c3f9645514bf0f00c3c7cc4d34c4ac1d3f231469bca011e043aaf31761daf60205c6b8b0f5d9d5a3cf626efb4298ca42bf8f8fd545871441b99902cfa10f1182a5a4f77985e258f74a35f9f9c1d1d86a21a745ab3ee20b530d88f184fa1ea3a3e0aeb99efd01132edebb8206c161849379996e4d4e272cd6aa3c630218892d57e4443753eefbdb03e234d89b5d16719bdde05e40a9aa20b2617de32b7b422ef9dea0ad5acd9a80a2824fdc2a53e72c0ea9bdd885564245023bff94af9d1fa3f960e09a788cb805848dc05ed08041ff3b6ee630787a3417bb5f78d5c66469a28376b39c0e4abdf6d3f3db99a019e3fd4462985c970f208ae5821188d84f1921ae7cec0f3338ef71a764ce446a82e9ff200971581812098824ed4df7930fc1263cc86e161be9652f8dae13d8a94d913d6765a3cf5fe3087de601003fb8dec1818d961e397218d55c9950094b864d2d6c11d8c3a9e87b8bbb8e62385ce3ec63af5306b75559fe3494dcc5f53dd050eb434b5f9f4da42549bb0788b958d6e57b0db81e75757c6a08cb56be6a583df3032848ce000ee6e8424cd1a221dc24b490a5747da2d7068029ddf3d41430c078f55b6bed8b238bf34b1efeef97e511ee854df613f03df4218b93c3b851ef47ce9722ddd5c9ba6eb20c26175ee65c0e080d5c25d19fb32e7e8f275d79ac2ca9a5746c1f606e32cd73e54427ff62a65902679e103fb5b3f46e6d5383b0c89d67cd51ae62e74b2beb56a22a2ea1c1ce2155fbe3ba3397be210e0f6a913b450aadb41f155c39343510ffe0d9ecd62e0cd6698ad689b46b8b50c26071b5fe38afb8654a17dee53bf234f3b182828851995e53da5f301b3d18be977a9c8f562e8591a88870de762b2101fa0014e887b90c9fbb46ed59120850338e0aed7a79f7b4ab6fbfcdbd47ae4acaf38e4a74ffb13a093d1495ddedb57984d9314997179c2badf69d0ac71bc35e05f89b7cdb8cd5992aef1ca93c1a972a108d0669edaa61aea6736318c79f723d8c1b4e624e001b5407d0fbef17121d2d995a8d10084c3781b92479a92a163fd", 0x1000}, 0x1006) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="f6", 0x1, 0x91, 0x0, 0x0) 20:52:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chmod(&(0x7f0000000100)='.\x00', 0xc05897a0db1ef5f3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) [ 969.320263] Dead loop on virtual device ip6_vti0, fix it urgently! [ 969.377666] Dead loop on virtual device ip6_vti0, fix it urgently! [ 969.421194] Dead loop on virtual device ip6_vti0, fix it urgently! [ 969.481586] Dead loop on virtual device ip6_vti0, fix it urgently! [ 969.539792] Dead loop on virtual device ip6_vti0, fix it urgently! 20:52:23 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000006d00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000400000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000002c0)=0x9) connect(r0, &(0x7f0000000080)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x80) close(r0) [ 969.584100] Dead loop on virtual device ip6_vti0, fix it urgently! [ 971.354122] kauditd_printk_skb: 207 callbacks suppressed [ 971.354136] audit: type=1400 audit(1542919944.856:616): avc: denied { map } for pid=639 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 971.383310] overlayfs: failed to resolve './file1': -2 20:52:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x1000000000006, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x52, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000380)={0x103ff, 0x2, 0x105000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000400)) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000440)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) r5 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$UHID_INPUT(r5, &(0x7f0000001100)={0x8, "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", 0x1000}, 0x1006) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="f6", 0x1, 0x91, 0x0, 0x0) 20:52:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) pipe(&(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f00000008c0)) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000940)) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000600)=0x98) 20:52:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) ioctl(r0, 0x4000008907, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:52:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chmod(&(0x7f0000000100)='.\x00', 0xc05897a0db1ef5f3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 20:52:24 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000006d00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000400000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000002c0)=0x9) connect(r0, &(0x7f0000000080)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x80) close(r0) [ 971.603235] audit: type=1400 audit(1542919944.886:621): avc: denied { map } for pid=639 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 971.828779] audit: type=1400 audit(1542919944.916:622): avc: denied { map } for pid=643 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chmod(&(0x7f0000000100)='.\x00', 0xc05897a0db1ef5f3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) [ 972.032745] audit: type=1400 audit(1542919944.926:623): avc: denied { map } for pid=637 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.252642] audit: type=1400 audit(1542919944.926:624): avc: denied { map } for pid=643 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.455011] audit: type=1400 audit(1542919944.936:625): avc: denied { map } for pid=639 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:26 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) r1 = accept4(r0, &(0x7f0000000640)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000200)=0x80, 0x80800) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="cf001842ef188c485c74a2028f08d589a14390edd49ba31986c1d6a551148f42c3db1526bcf47427b3b5094e049b1b8a5e19b2e6e60317d188330ad72f29d04e2284120a9bac0a570df35741a4be6d999c866ce11de5ba1fb0972312550389eba4acdc7aae1fceedd618afae015ece1960ac0fd3b135a7e21c4bda923656a557107a9b720262a25da00d7f355f726ad9894d87ff82ce0e54acca08e9f4fdbb71e99fc2ce2c62634963e8d885605ccae061440a04c8ee1bd7"], 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ef0000/0x3000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000006c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0x4, 0x0, 0x0, [{0x81, 0x7, 0x5, [], 0x3}, {0x2, 0x7, 0x37, [], 0x4}, {0xff, 0x200}, {0x1ff, 0x0, 0x6, [], 0x3}, {0x0, 0x7, 0x1}, {0x1, 0x9, 0x4, [], 0x1}, {0x0, 0x4, 0x1}, {0xff, 0x1, 0x1, [], 0x9569}, {0x1, 0x8000, 0x10000, [], 0x6}, {0x5ad, 0x661f27c8, 0x0, [], 0x9}, {0x401, 0x7, 0x7ff, [], 0x4}, {0x5, 0x8}, {0x0, 0x3, 0x1}, {0x2, 0xfffffffffffffffc, 0x3, [], 0xf0}, {0xfffffffffffffffc, 0x1, 0x3, [], 0x4e}, {0x6f, 0x7f, 0xb4, [], 0x4}, {0x20, 0x0, 0x8, [], 0x523}, {0xffffffff, 0x1ff, 0x0, [], 0x8}, {0x8, 0x922, 0x7, [], 0xcf}, {0x0, 0x5, 0x3, [], 0x2}, {0x100, 0x4, 0x0, [], 0x10000}, {0x1, 0xc0b, 0x9c, [], 0x6}, {0x0, 0x3ff, 0x0, [], 0x6}, {0x5, 0xfff, 0xe6ee, [], 0x3f}]}}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x1, 0x0, 0x1, 0x1000, &(0x7f000040e000/0x1000)=nil}) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000100)={0xb7af, 0x80000001, 0x3, 0x3, 0x9}) r6 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x68, &(0x7f00000004c0)=[@in={0x2, 0x4e22}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e22, 0x0, @mcast2, 0x10001}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x0, 0xb195, @remote, 0x1}]}, &(0x7f00000005c0)=0x10) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x2, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$KVM_GET_MSRS(r7, 0xc008ae88, &(0x7f0000000440)={0x4, 0x0, [{}, {}, {}, {}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r7, 0xc04c5349, &(0x7f0000000340)={0x1, 0x7ff, 0xa750}) mremap(&(0x7f0000b7a000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$KVM_CHECK_EXTENSION(r6, 0xae03, 0x20) ioctl$DRM_IOCTL_RM_MAP(r7, 0x4028641b, &(0x7f0000000400)={&(0x7f000090a000/0x2000)=nil, 0x8, 0x7, 0x86, &(0x7f0000af4000/0x2000)=nil, 0x80000001}) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f00000003c0)={0x18, 0x0, {0x1, @random="020c1bdf4835", 'vlan0\x00'}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00009b2000/0x18000)=nil, &(0x7f0000001580)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442404020000006766c7442406000b0000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000001500), 0x243) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @mss, @mss, @mss, @mss], 0x6) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000300)) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) [ 972.622054] audit: type=1400 audit(1542919944.946:626): avc: denied { map } for pid=644 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) pipe(&(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f00000008c0)) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000940)) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000600)=0x98) [ 972.799458] audit: type=1400 audit(1542919944.946:627): avc: denied { map } for pid=644 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.943179] audit: type=1400 audit(1542919944.946:628): avc: denied { map } for pid=644 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 973.120604] audit: type=1400 audit(1542919945.036:629): avc: denied { map } for pid=644 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chmod(&(0x7f0000000100)='.\x00', 0xc05897a0db1ef5f3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 20:52:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x3, 0x90, [0x20000880, 0x0, 0x0, 0x20000a30, 0x20000a60], 0xfeffff07, &(0x7f0000000040), &(0x7f0000000880)=[{0x11000000}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) 20:52:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x15, &(0x7f0000000080)={0x0, @broadcast, 0x0, 0x0, 'ovf\x00'}, 0x2c) [ 976.364458] kauditd_printk_skb: 199 callbacks suppressed [ 976.364471] audit: type=1400 audit(1542919949.896:829): avc: denied { map } for pid=700 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) pipe(&(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f00000008c0)) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000940)) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000600)=0x98) [ 976.486445] audit: type=1400 audit(1542919949.956:830): avc: denied { map } for pid=701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 20:52:30 executing program 2: r0 = socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000003dc0)=0x4, 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 20:52:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 20:52:30 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2003, 0x10001) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x7fffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000800)='cgroupwlan1^\x00', r0}, 0x10) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000002c0)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) [ 976.662644] audit: type=1800 audit(1542919949.966:831): pid=663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor4" name="file0" dev="overlay" ino=111344 res=0 [ 976.808042] audit: type=1400 audit(1542919949.986:832): avc: denied { map } for pid=701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000ff0)=[{0x28, 0x0, 0x0, 0xfffff028}, {0x80000006}]}, 0x10) [ 976.924279] audit: type=1400 audit(1542919949.996:833): avc: denied { map } for pid=701 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.085751] audit: type=1400 audit(1542919949.996:834): avc: denied { map } for pid=701 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, {0x8, 0x3, 0xa1, 0x4, 0x8001, 0x7ff}, 0x3f40}, 0xe) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x400400) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$void(r0, 0x5451) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x28, &(0x7f0000000100)=0x2) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x8, [0x0, 0x3, 0x100000001, 0x10001, 0x81, 0x0, 0x4, 0x9]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x8c, 0x8, 0x7fff, 0x4, 0x3, 0x5, 0x6000000000, 0x100000000}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x3}], 0x2c) write$P9_RLINK(r1, &(0x7f0000000500)={0x7, 0x47, 0x1}, 0x7) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8", 0x39, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) [ 977.238612] audit: type=1400 audit(1542919950.046:835): avc: denied { map } for pid=701 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.385324] audit: type=1400 audit(1542919950.066:836): avc: denied { map } for pid=701 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) [ 977.516588] audit: type=1400 audit(1542919950.066:837): avc: denied { map } for pid=701 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.753637] audit: type=1400 audit(1542919950.096:838): avc: denied { map } for pid=701 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 20:52:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 20:52:32 executing program 4: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x8, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x3e3) 20:52:32 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x624, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240)=0x3, 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x8000000000044000) io_setup(0xb, &(0x7f0000000240)) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="40000000000000000000000000000000010000000000000005000000000000000000000000000000000000000008000000000000000000000000000000000000117372f0fc95d7"], 0x47) lseek(r3, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) ioctl$LOOP_CLR_FD(r1, 0x4c01) r4 = open(&(0x7f0000000600)='./bus\x00', 0x40, 0x140) close(r1) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000940)={'team0\x00'}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001f40)={0x0, @multicast2, @local}, &(0x7f0000001f80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000002080)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000002180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000002480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000024c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000002500)={{{@in=@multicast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000002600)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000026c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002800)={@dev, @remote}, &(0x7f0000002840)=0xc) getsockname$packet(r2, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000028c0)=0x14) accept4$packet(r4, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003e40)=0x14, 0x800) accept$packet(r4, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) accept4$packet(r3, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x800) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000004140)={@local}, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000004200), 0x800) 20:52:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 20:52:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, {0x8, 0x3, 0xa1, 0x4, 0x8001, 0x7ff}, 0x3f40}, 0xe) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x400400) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$void(r0, 0x5451) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x28, &(0x7f0000000100)=0x2) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x8, [0x0, 0x3, 0x100000001, 0x10001, 0x81, 0x0, 0x4, 0x9]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x8c, 0x8, 0x7fff, 0x4, 0x3, 0x5, 0x6000000000, 0x100000000}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x3}], 0x2c) write$P9_RLINK(r1, &(0x7f0000000500)={0x7, 0x47, 0x1}, 0x7) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8", 0x39, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) 20:52:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 20:52:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, {0x8, 0x3, 0xa1, 0x4, 0x8001, 0x7ff}, 0x3f40}, 0xe) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x400400) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$void(r0, 0x5451) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x28, &(0x7f0000000100)=0x2) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x8, [0x0, 0x3, 0x100000001, 0x10001, 0x81, 0x0, 0x4, 0x9]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x8c, 0x8, 0x7fff, 0x4, 0x3, 0x5, 0x6000000000, 0x100000000}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x3}], 0x2c) write$P9_RLINK(r1, &(0x7f0000000500)={0x7, 0x47, 0x1}, 0x7) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8", 0x39, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) 20:52:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 20:52:34 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000200)={0x0, 'team0\x00'}, 0x18) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, r1, 0x0) [ 981.389532] kauditd_printk_skb: 139 callbacks suppressed [ 981.389547] audit: type=1400 audit(1542919954.916:978): avc: denied { map } for pid=778 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 981.507433] audit: type=1400 audit(1542919954.926:979): avc: denied { map } for pid=778 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) [ 981.619522] audit: type=1400 audit(1542919954.926:980): avc: denied { map } for pid=778 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 981.787997] audit: type=1400 audit(1542919954.996:981): avc: denied { map } for pid=778 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 20:52:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2200) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="6cfd0729aaf99e3390e25e8160ae06ed97102a0698b4641c554f5eb681f207d57263bc556aa461d090350e5d093de1f6f342ba5c83f09576fda07605439e2d48442477dedb4f442e"], 0x1}}, 0x44801) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) modify_ldt$write2(0x11, &(0x7f0000000300)={0x3ff, 0x100000, 0xffffffffffffffff, 0x6, 0x2, 0x400, 0x100, 0x400, 0x1, 0x8}, 0x10) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="160000006f0100010000000000000001000000000000c47a664312650133bf382d361f7f6edd2eb58036196c327b08"], 0x2f) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r3, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r3, &(0x7f0000000080)={0x1a, 0x7, 0x0, {0x11, 'vboxnet1trustedlo'}}, 0x1a) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r3, &(0x7f0000000800)={0xa0, 0x19, 0x1, {0x0, {0x3}, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}}, 0xa0) write$P9_RSTATFS(r3, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) [ 981.974634] audit: type=1400 audit(1542919955.006:982): avc: denied { map } for pid=779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:35 executing program 2: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='net/route\x00') sendfile(r0, r2, 0x0, 0x80000001) [ 982.112652] audit: type=1400 audit(1542919955.006:983): avc: denied { map } for pid=779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.204619] audit: type=1400 audit(1542919955.006:984): avc: denied { map } for pid=779 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, {0x8, 0x3, 0xa1, 0x4, 0x8001, 0x7ff}, 0x3f40}, 0xe) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x400400) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$void(r0, 0x5451) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x28, &(0x7f0000000100)=0x2) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x8, [0x0, 0x3, 0x100000001, 0x10001, 0x81, 0x0, 0x4, 0x9]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x8c, 0x8, 0x7fff, 0x4, 0x3, 0x5, 0x6000000000, 0x100000000}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x3}], 0x2c) write$P9_RLINK(r1, &(0x7f0000000500)={0x7, 0x47, 0x1}, 0x7) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8", 0x39, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) [ 982.370375] audit: type=1400 audit(1542919955.006:985): avc: denied { map } for pid=779 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.484836] audit: type=1400 audit(1542919955.036:986): avc: denied { map } for pid=778 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.687146] audit: type=1400 audit(1542919955.076:987): avc: denied { map } for pid=779 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, {0x8, 0x3, 0xa1, 0x4, 0x8001, 0x7ff}, 0x3f40}, 0xe) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x400400) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$void(r0, 0x5451) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x28, &(0x7f0000000100)=0x2) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x8, [0x0, 0x3, 0x100000001, 0x10001, 0x81, 0x0, 0x4, 0x9]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x8c, 0x8, 0x7fff, 0x4, 0x3, 0x5, 0x6000000000, 0x100000000}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x3}], 0x2c) write$P9_RLINK(r1, &(0x7f0000000500)={0x7, 0x47, 0x1}, 0x7) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8", 0x39, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) 20:52:36 executing program 2: clock_adjtime(0x0, &(0x7f0000000180)={0xe18d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) 20:52:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)="6576656e7473000000c7aaff0fb0c79b9391e4ae6459d80000000000", 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x40086607, &(0x7f0000000000)={0x7ffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 20:52:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000440), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 20:52:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x42000000000e900, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="eb2c906d6b6673ff666174000404010a02000274f1f8", 0x16}], 0x0, &(0x7f0000000100)={[{@fat=@uid={'uid'}}, {@fat=@nfs='nfs'}, {@nodots='nodots'}]}) listen(0xffffffffffffffff, 0x0) 20:52:39 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) 20:52:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x12d) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x40}, r1}}, 0x30) 20:52:40 executing program 0: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x80040) 20:52:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, {0x8, 0x3, 0xa1, 0x4, 0x8001, 0x7ff}, 0x3f40}, 0xe) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x400400) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$void(r0, 0x5451) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x28, &(0x7f0000000100)=0x2) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x8, [0x0, 0x3, 0x100000001, 0x10001, 0x81, 0x0, 0x4, 0x9]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x8c, 0x8, 0x7fff, 0x4, 0x3, 0x5, 0x6000000000, 0x100000000}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x3}], 0x2c) write$P9_RLINK(r1, &(0x7f0000000500)={0x7, 0x47, 0x1}, 0x7) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8", 0x39, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) 20:52:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, {0x8, 0x3, 0xa1, 0x4, 0x8001, 0x7ff}, 0x3f40}, 0xe) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x400400) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$void(r0, 0x5451) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x28, &(0x7f0000000100)=0x2) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x8, [0x0, 0x3, 0x100000001, 0x10001, 0x81, 0x0, 0x4, 0x9]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x8c, 0x8, 0x7fff, 0x4, 0x3, 0x5, 0x6000000000, 0x100000000}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @loopback, 0x3}], 0x2c) write$P9_RLINK(r1, &(0x7f0000000500)={0x7, 0x47, 0x1}, 0x7) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8", 0x39, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) 20:52:40 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="24000000020707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 20:52:40 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) 20:52:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x42000000000e900, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="eb2c906d6b6673ff666174000404010a02000274f1f8", 0x16}], 0x0, &(0x7f0000000100)={[{@fat=@uid={'uid'}}, {@fat=@nfs='nfs'}, {@nodots='nodots'}]}) listen(0xffffffffffffffff, 0x0) 20:52:40 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) [ 986.157084] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 20:52:41 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) [ 986.474683] kauditd_printk_skb: 140 callbacks suppressed [ 986.474697] audit: type=1400 audit(1542919962.008:1128): avc: denied { map } for pid=861 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 986.636094] audit: type=1400 audit(1542919962.018:1129): avc: denied { map } for pid=861 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:42 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) [ 986.826617] audit: type=1400 audit(1542919962.038:1130): avc: denied { map } for pid=861 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.075303] audit: type=1400 audit(1542919962.048:1131): avc: denied { map } for pid=861 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x42000000000e900, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="eb2c906d6b6673ff666174000404010a02000274f1f8", 0x16}], 0x0, &(0x7f0000000100)={[{@fat=@uid={'uid'}}, {@fat=@nfs='nfs'}, {@nodots='nodots'}]}) listen(0xffffffffffffffff, 0x0) 20:52:42 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) [ 987.316111] audit: type=1400 audit(1542919962.138:1132): avc: denied { map } for pid=861 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.464875] audit: type=1400 audit(1542919962.208:1133): avc: denied { map } for pid=861 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000)='@', &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), &(0x7f0000000200)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000200), &(0x7f0000000140)}, 0x20) [ 987.600409] audit: type=1400 audit(1542919962.228:1134): avc: denied { map } for pid=861 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.715776] audit: type=1400 audit(1542919962.298:1135): avc: denied { map } for pid=861 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.855698] audit: type=1400 audit(1542919962.308:1136): avc: denied { map } for pid=861 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.043423] audit: type=1400 audit(1542919962.458:1137): avc: denied { map } for pid=861 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:43 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:52:43 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) 20:52:44 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfe33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f00000000c0)=0x6, 0x4) sendto$unix(r0, &(0x7f0000000080), 0x7272, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x8, 0x4) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) 20:52:44 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) 20:52:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x42000000000e900, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="eb2c906d6b6673ff666174000404010a02000274f1f8", 0x16}], 0x0, &(0x7f0000000100)={[{@fat=@uid={'uid'}}, {@fat=@nfs='nfs'}, {@nodots='nodots'}]}) listen(0xffffffffffffffff, 0x0) 20:52:44 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) 20:52:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0xfffffffffffffe41}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000000000f1b30e2d0005000600001f00000a00000000000e2c2cf000000000000000000000000000000000000000000000020001000000e4ffffffff010000000005000500000000000a00000000000000ff1700000000000000000080000000170000000000000000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 20:52:45 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000b00), &(0x7f0000000b40)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000b80)=ANY=[]) 20:52:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) close(r2) close(r1) 20:52:45 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:52:46 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xffffffffffffff00, 0x8000) setxattr$security_ima(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@md5={0x1, "8027dc4c4298f6c9e10aa3caf7515d28"}, 0x11, 0x1) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0), 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000380)=ANY=[@ANYBLOB="040000200000000000000000000000000500000000000000ef0b000000000000fc7fffffffff090a00000000000002000000e9ffffff040400000000fc115f3f15000000000000"]) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000004c0)=[@in6={0xa, 0x4e22, 0x80000000, @remote, 0x6}, @in6={0xa, 0x4e20, 0x95, @dev={0xfe, 0x80, [], 0x21}, 0xfffffffffffffffd}], 0x38) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x1}, 0x8) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x32, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/autofs\x00', 0x100, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)="002f0000638915e0df56ac591a298569506c490000") ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000000)) getdents(r3, &(0x7f00000000c0)=""/147, 0x93) getdents(r3, &(0x7f0000000ea9)=""/407, 0x197) 20:52:46 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r2, 0x1) 20:52:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x10270) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 20:52:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001340)="0a5c2d0240316285717070") mmap(&(0x7f0000013000/0x2000)=nil, 0x2000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000280)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) close(r2) close(r1) 20:52:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x0, 0x0, @pic={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x1, 0x0, @pic={0x0, 0x8}}) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0xfffffffffffffffe}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 991.486139] kauditd_printk_skb: 120 callbacks suppressed [ 991.486155] audit: type=1400 audit(1542919967.018:1258): avc: denied { map } for pid=935 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r2, 0x1) 20:52:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x803}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) [ 991.728403] audit: type=1400 audit(1542919967.038:1259): avc: denied { map } for pid=935 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001ffff00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000140)}) [ 991.911074] audit: type=1400 audit(1542919967.088:1260): avc: denied { map } for pid=935 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.026909] audit: type=1400 audit(1542919967.098:1261): avc: denied { map } for pid=935 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.192640] audit: type=1400 audit(1542919967.138:1262): avc: denied { map } for pid=943 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:47 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 992.314242] audit: type=1400 audit(1542919967.138:1263): avc: denied { map } for pid=943 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.440166] audit: type=1400 audit(1542919967.168:1264): avc: denied { map } for pid=943 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:48 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x80100) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x401, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000640)=0xfffffffffffff801) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000840)={0xf5, 0x29, 0x1, {0x200, [{{0x0, 0x1, 0x6}, 0xb85, 0x80, 0x5, './bus'}, {{0x6, 0x2, 0x3}, 0xfffffffffffffff8, 0x100000000, 0x5, './bus'}, {{0x0, 0x0, 0x6}, 0x9a, 0x818, 0x5, './bus'}, {{0x88, 0x1, 0x1}, 0x3, 0x8, 0x5, './bus'}, {{0xd1, 0x1, 0x2}, 0x9, 0xfff, 0x7, './file0'}, {{0x0, 0x0, 0x4}, 0x3f00000000, 0x800, 0x5, './bus'}, {{0x34, 0x1, 0x1}, 0x80000001, 0x6, 0x5, './bus'}, {{0x2, 0x2, 0x1}, 0x3, 0x1d, 0x5, './bus'}]}}, 0xf5) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0xfffffffffffffe51) ioctl$KDDISABIO(r0, 0x4b37) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) fremovexattr(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000293dbd9231"]) socket$alg(0x26, 0x5, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, 0x0, &(0x7f0000000380)) sendfile(r1, r4, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r4, 0xab02, 0x0) creat(&(0x7f0000000780)='./bus\x00', 0x0) [ 992.550279] audit: type=1400 audit(1542919967.178:1265): avc: denied { map } for pid=945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.702976] audit: type=1400 audit(1542919967.178:1266): avc: denied { map } for pid=935 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000050d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x8}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) [ 992.822310] audit: type=1400 audit(1542919967.188:1268): avc: denied { map } for pid=943 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:48 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r2, 0x1) 20:52:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001ffff00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000140)}) 20:52:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001ffff00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000140)}) 20:52:49 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:52:49 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r2, 0x1) [ 994.376924] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 994.397324] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:52:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001ffff00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000140)}) [ 994.475764] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 994.506464] IPv6: ADDRCONF(NETDEV_UP): veth2: link is not ready [ 994.523789] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready [ 994.530992] IPv6: ADDRCONF(NETDEV_UP): veth4: link is not ready [ 994.554413] IPv6: ADDRCONF(NETDEV_UP): veth5: link is not ready [ 994.565938] IPv6: ADDRCONF(NETDEV_UP): veth6: link is not ready [ 994.626427] IPv6: ADDRCONF(NETDEV_UP): veth7: link is not ready [ 994.643631] IPv6: ADDRCONF(NETDEV_UP): veth8: link is not ready [ 994.689748] IPv6: ADDRCONF(NETDEV_UP): veth9: link is not ready [ 994.707062] IPv6: ADDRCONF(NETDEV_UP): veth10: link is not ready 20:52:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001ffff00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000140)}) [ 994.743810] IPv6: ADDRCONF(NETDEV_UP): veth11: link is not ready [ 994.807703] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:52:50 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) sendfile(r1, r0, &(0x7f0000000180)=0xd0000, 0x100000005) setns(0xffffffffffffffff, 0x14020000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x4008, &(0x7f0000000e00)=ANY=[@ANYBLOB]) [ 994.885488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 994.905710] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready 20:52:50 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x80100) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x401, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000640)=0xfffffffffffff801) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000840)={0xf5, 0x29, 0x1, {0x200, [{{0x0, 0x1, 0x6}, 0xb85, 0x80, 0x5, './bus'}, {{0x6, 0x2, 0x3}, 0xfffffffffffffff8, 0x100000000, 0x5, './bus'}, {{0x0, 0x0, 0x6}, 0x9a, 0x818, 0x5, './bus'}, {{0x88, 0x1, 0x1}, 0x3, 0x8, 0x5, './bus'}, {{0xd1, 0x1, 0x2}, 0x9, 0xfff, 0x7, './file0'}, {{0x0, 0x0, 0x4}, 0x3f00000000, 0x800, 0x5, './bus'}, {{0x34, 0x1, 0x1}, 0x80000001, 0x6, 0x5, './bus'}, {{0x2, 0x2, 0x1}, 0x3, 0x1d, 0x5, './bus'}]}}, 0xf5) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0xfffffffffffffe51) ioctl$KDDISABIO(r0, 0x4b37) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) fremovexattr(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000293dbd9231"]) socket$alg(0x26, 0x5, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, 0x0, &(0x7f0000000380)) sendfile(r1, r4, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r4, 0xab02, 0x0) creat(&(0x7f0000000780)='./bus\x00', 0x0) [ 994.961345] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 995.000269] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 995.060608] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 995.097562] IPv6: ADDRCONF(NETDEV_CHANGE): veth7: link becomes ready [ 995.144940] IPv6: ADDRCONF(NETDEV_CHANGE): veth6: link becomes ready [ 995.230041] IPv6: ADDRCONF(NETDEV_CHANGE): veth9: link becomes ready [ 995.282786] IPv6: ADDRCONF(NETDEV_CHANGE): veth8: link becomes ready [ 995.330680] IPv6: ADDRCONF(NETDEV_CHANGE): veth11: link becomes ready [ 995.379732] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 995.427509] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 995.446740] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 995.453588] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 995.540283] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 995.562695] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 995.606592] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:52:51 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001ffff00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000140)}) 20:52:51 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000000c000/0x2000)=nil, 0x2000) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001ffff00", 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000140)}) [ 996.052824] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 996.122732] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 996.162719] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 996.222760] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! 20:52:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00', 0x0, 0x0, 0x2000000}, 0x2c) 20:52:52 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 996.493391] kauditd_printk_skb: 128 callbacks suppressed [ 996.493406] audit: type=1400 audit(1542919972.028:1396): avc: denied { map } for pid=1043 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 996.661084] audit: type=1400 audit(1542919972.058:1397): avc: denied { map } for pid=1043 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:52 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) sendfile(r1, r0, &(0x7f0000000180)=0xd0000, 0x100000005) setns(0xffffffffffffffff, 0x14020000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x4008, &(0x7f0000000e00)=ANY=[@ANYBLOB]) [ 996.838718] audit: type=1400 audit(1542919972.078:1398): avc: denied { map } for pid=1043 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 996.902092] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 996.972642] audit: type=1400 audit(1542919972.078:1399): avc: denied { map } for pid=1043 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:52 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() mprotect(&(0x7f0000607000/0x2000)=nil, 0x2000, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600003, &(0x7f0000000040)) 20:52:52 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="24000000660007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, &(0x7f0000000880)=""/4096, 0x1000, 0x0, 0x0, 0x0) [ 997.193140] audit: type=1400 audit(1542919972.128:1400): avc: denied { map } for pid=1044 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.302804] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 997.325609] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 997.394187] audit: type=1400 audit(1542919972.138:1401): avc: denied { map } for pid=1044 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.539667] audit: type=1400 audit(1542919972.168:1402): avc: denied { map } for pid=1044 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:53 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x80100) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x401, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000640)=0xfffffffffffff801) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000840)={0xf5, 0x29, 0x1, {0x200, [{{0x0, 0x1, 0x6}, 0xb85, 0x80, 0x5, './bus'}, {{0x6, 0x2, 0x3}, 0xfffffffffffffff8, 0x100000000, 0x5, './bus'}, {{0x0, 0x0, 0x6}, 0x9a, 0x818, 0x5, './bus'}, {{0x88, 0x1, 0x1}, 0x3, 0x8, 0x5, './bus'}, {{0xd1, 0x1, 0x2}, 0x9, 0xfff, 0x7, './file0'}, {{0x0, 0x0, 0x4}, 0x3f00000000, 0x800, 0x5, './bus'}, {{0x34, 0x1, 0x1}, 0x80000001, 0x6, 0x5, './bus'}, {{0x2, 0x2, 0x1}, 0x3, 0x1d, 0x5, './bus'}]}}, 0xf5) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0xfffffffffffffe51) ioctl$KDDISABIO(r0, 0x4b37) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) fremovexattr(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000293dbd9231"]) socket$alg(0x26, 0x5, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, 0x0, &(0x7f0000000380)) sendfile(r1, r4, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r4, 0xab02, 0x0) creat(&(0x7f0000000780)='./bus\x00', 0x0) 20:52:53 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x4002000, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x400, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000540)="bb0890affa4575690ec6e10d5b91d2247b73967d63b6ae3e84a4ab04fbe28b283e3c00132d4e7e34233143a1abf00f9c098482b1c717ce0ba909af3a158ee71567eda5927125", 0x46) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000040)=0x500, 0x10000000000443) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000900)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x800, "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", 0x67, 0x0, 0x6a, 0x0, 0xd100000000000000, 0x3ff, 0xbac1, 0x1}}}, 0x128) writev(r2, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000200)=0x4000000) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) sendmsg$xdp(r2, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x11) [ 997.700401] audit: type=1400 audit(1542919972.168:1403): avc: denied { map } for pid=1043 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.727649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pig=1064 comm=syz-executor2 [ 997.742843] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 997.792752] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 997.805325] audit: type=1400 audit(1542919972.188:1404): avc: denied { map } for pid=1043 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.865517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pig=1064 comm=syz-executor2 [ 998.002695] audit: type=1400 audit(1542919972.188:1405): avc: denied { map } for pid=1043 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:53 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="24000000660007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, &(0x7f0000000880)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:52:54 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) sendfile(r1, r0, &(0x7f0000000180)=0xd0000, 0x100000005) setns(0xffffffffffffffff, 0x14020000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x4008, &(0x7f0000000e00)=ANY=[@ANYBLOB]) 20:52:54 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000040)="1f0000000606ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) [ 998.824886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pig=1085 comm=syz-executor2 20:52:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() mprotect(&(0x7f0000607000/0x2000)=nil, 0x2000, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600003, &(0x7f0000000040)) 20:52:54 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="24000000660007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, &(0x7f0000000880)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:52:55 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x80100) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x401, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000640)=0xfffffffffffff801) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000840)={0xf5, 0x29, 0x1, {0x200, [{{0x0, 0x1, 0x6}, 0xb85, 0x80, 0x5, './bus'}, {{0x6, 0x2, 0x3}, 0xfffffffffffffff8, 0x100000000, 0x5, './bus'}, {{0x0, 0x0, 0x6}, 0x9a, 0x818, 0x5, './bus'}, {{0x88, 0x1, 0x1}, 0x3, 0x8, 0x5, './bus'}, {{0xd1, 0x1, 0x2}, 0x9, 0xfff, 0x7, './file0'}, {{0x0, 0x0, 0x4}, 0x3f00000000, 0x800, 0x5, './bus'}, {{0x34, 0x1, 0x1}, 0x80000001, 0x6, 0x5, './bus'}, {{0x2, 0x2, 0x1}, 0x3, 0x1d, 0x5, './bus'}]}}, 0xf5) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0xfffffffffffffe51) ioctl$KDDISABIO(r0, 0x4b37) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) fremovexattr(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000293dbd9231"]) socket$alg(0x26, 0x5, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, 0x0, &(0x7f0000000380)) sendfile(r1, r4, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r4, 0xab02, 0x0) creat(&(0x7f0000000780)='./bus\x00', 0x0) 20:52:55 executing program 4: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) move_pages(0x0, 0x0, &(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880), 0x4) [ 999.560420] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 999.654215] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 999.793522] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 999.806902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pig=1107 comm=syz-executor2 [ 999.822806] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 999.850764] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 20:52:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000000)={&(0x7f0000000480)=@dellink={0x28, 0x11, 0x101, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) [ 1000.064697] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:52:55 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="24000000660007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, &(0x7f0000000880)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:52:55 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) sendfile(r1, r0, &(0x7f0000000180)=0xd0000, 0x100000005) setns(0xffffffffffffffff, 0x14020000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x4008, &(0x7f0000000e00)=ANY=[@ANYBLOB]) 20:52:56 executing program 4: write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="8c0000007d01000000710007008100000016000000000000000000000000000000000100000003000000800000000000000021009a766d6e6574302d232d5b7365637572697479657468306574683047"], 0x50) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f00000003c0)={'team0\x00'}) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, &(0x7f0000000140)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}, &(0x7f00000001c0)}) [ 1000.626228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:52:56 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() mprotect(&(0x7f0000607000/0x2000)=nil, 0x2000, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600003, &(0x7f0000000040)) [ 1000.822852] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 1000.833045] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:52:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpu.weight\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8007ffff000) [ 1000.943795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pig=1127 comm=syz-executor2 [ 1001.103042] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:52:56 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x3, @win={{}, 0x0, 0x0, &(0x7f0000000080)={{0x8}, &(0x7f0000000040)={{}, &(0x7f0000000000)}}, 0x2, &(0x7f0000000100)}}) 20:52:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={"627269646765300000010000001100"}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) kcmp(r3, r4, 0x0, r1, r1) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) dup3(r2, r0, 0x0) [ 1001.515192] kauditd_printk_skb: 153 callbacks suppressed [ 1001.515208] audit: type=1400 audit(1542919977.048:1559): avc: denied { map } for pid=1135 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() mprotect(&(0x7f0000607000/0x2000)=nil, 0x2000, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r1) ptrace$getsig(0x2, r1, 0xffffffffff600003, &(0x7f0000000040)) [ 1001.702665] audit: type=1400 audit(1542919977.108:1560): avc: denied { map } for pid=1135 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1001.743117] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 1001.789728] audit: type=1400 audit(1542919977.108:1561): avc: denied { map } for pid=1135 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:57 executing program 5: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) delete_module(&(0x7f0000000840)="736563757269747900dd29598185b623d78cbef29e33df830f73b9bf50d31cc1144f69b046d77d0402a3fc9b7ab73518d9a1636e9ab51a6f3fbd3b4375812ad66c2613da56c07f220e0d8ddf19ca99f2a80de05b8646", 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xa7}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) [ 1001.941843] audit: type=1400 audit(1542919977.138:1562): avc: denied { map } for pid=1133 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:57 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x3, @win={{}, 0x0, 0x0, &(0x7f0000000080)={{0x8}, &(0x7f0000000040)={{}, &(0x7f0000000000)}}, 0x2, &(0x7f0000000100)}}) [ 1002.124359] audit: type=1400 audit(1542919977.158:1563): avc: denied { map } for pid=1135 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.271846] audit: type=1400 audit(1542919977.188:1564): avc: denied { map } for pid=1133 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.381839] audit: type=1400 audit(1542919977.188:1565): avc: denied { map } for pid=1133 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.533863] audit: type=1400 audit(1542919977.188:1566): avc: denied { map } for pid=1135 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.596462] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.603287] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.649402] audit: type=1400 audit(1542919977.418:1567): avc: denied { map } for pid=1152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.737415] audit: type=1400 audit(1542919977.428:1568): avc: denied { map } for pid=1152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:52:58 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x3, @win={{}, 0x0, 0x0, &(0x7f0000000080)={{0x8}, &(0x7f0000000040)={{}, &(0x7f0000000000)}}, 0x2, &(0x7f0000000100)}}) 20:52:58 executing program 5: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) delete_module(&(0x7f0000000840)="736563757269747900dd29598185b623d78cbef29e33df830f73b9bf50d31cc1144f69b046d77d0402a3fc9b7ab73518d9a1636e9ab51a6f3fbd3b4375812ad66c2613da56c07f220e0d8ddf19ca99f2a80de05b8646", 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xa7}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) 20:52:59 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x3, @win={{}, 0x0, 0x0, &(0x7f0000000080)={{0x8}, &(0x7f0000000040)={{}, &(0x7f0000000000)}}, 0x2, &(0x7f0000000100)}}) 20:52:59 executing program 4: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) delete_module(&(0x7f0000000840)="736563757269747900dd29598185b623d78cbef29e33df830f73b9bf50d31cc1144f69b046d77d0402a3fc9b7ab73518d9a1636e9ab51a6f3fbd3b4375812ad66c2613da56c07f220e0d8ddf19ca99f2a80de05b8646", 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xa7}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) 20:52:59 executing program 5: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) delete_module(&(0x7f0000000840)="736563757269747900dd29598185b623d78cbef29e33df830f73b9bf50d31cc1144f69b046d77d0402a3fc9b7ab73518d9a1636e9ab51a6f3fbd3b4375812ad66c2613da56c07f220e0d8ddf19ca99f2a80de05b8646", 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xa7}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) 20:53:00 executing program 4: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) delete_module(&(0x7f0000000840)="736563757269747900dd29598185b623d78cbef29e33df830f73b9bf50d31cc1144f69b046d77d0402a3fc9b7ab73518d9a1636e9ab51a6f3fbd3b4375812ad66c2613da56c07f220e0d8ddf19ca99f2a80de05b8646", 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xa7}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) 20:53:00 executing program 5: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) delete_module(&(0x7f0000000840)="736563757269747900dd29598185b623d78cbef29e33df830f73b9bf50d31cc1144f69b046d77d0402a3fc9b7ab73518d9a1636e9ab51a6f3fbd3b4375812ad66c2613da56c07f220e0d8ddf19ca99f2a80de05b8646", 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xa7}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) 20:53:01 executing program 4: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) delete_module(&(0x7f0000000840)="736563757269747900dd29598185b623d78cbef29e33df830f73b9bf50d31cc1144f69b046d77d0402a3fc9b7ab73518d9a1636e9ab51a6f3fbd3b4375812ad66c2613da56c07f220e0d8ddf19ca99f2a80de05b8646", 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xa7}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) [ 1006.536147] kauditd_printk_skb: 207 callbacks suppressed [ 1006.536164] audit: type=1400 audit(1542919982.068:1776): avc: denied { map } for pid=1221 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.592657] audit: type=1400 audit(1542919982.098:1777): avc: denied { map } for pid=1221 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.631036] audit: type=1400 audit(1542919982.098:1778): avc: denied { map } for pid=1221 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.703980] audit: type=1400 audit(1542919982.108:1779): avc: denied { map } for pid=1221 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.733746] audit: type=1400 audit(1542919982.118:1780): avc: denied { map } for pid=1221 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.758833] audit: type=1400 audit(1542919982.148:1781): avc: denied { map } for pid=1221 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.799103] audit: type=1400 audit(1542919982.148:1782): avc: denied { map } for pid=1221 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.844155] audit: type=1400 audit(1542919982.158:1783): avc: denied { map } for pid=1221 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.937098] audit: type=1400 audit(1542919982.188:1784): avc: denied { map } for pid=1221 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.979924] audit: type=1400 audit(1542919982.198:1785): avc: denied { map } for pid=1221 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.062952] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 1009.343215] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:53:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x6f6}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x107c}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) 20:53:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x0, @remote}], 0x20) 20:53:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x6f6}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x107c}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) 20:53:05 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000140)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0505405, &(0x7f0000000140)) 20:53:05 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00'}, 0x18) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f00000004c0)={{}, 0x1, 0x0, 0x193e, {}, 0xff}) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}}, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) r2 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x0, &(0x7f0000000000)) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) 20:53:05 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0x7fffdffe2000}) 20:53:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f00008a8000)={0xa, 0x3}, 0x1c) r2 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r2, &(0x7f0000a29000)={&(0x7f00000001c0)=@in6={0xa, 0x3, 0x0, @mcast2}, 0x1c, &(0x7f0000000140)}, 0x2000008000) sendto$inet6(r2, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000), 0x1c) recvmsg$kcm(r1, &(0x7f0000001400)={&(0x7f0000000280)=@nl, 0x80, &(0x7f0000001380), 0x10, 0x0, 0x131}, 0x0) 20:53:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup2(r0, r0) sendmsg$unix(r1, &(0x7f0000002600)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000024c0), 0x0, &(0x7f00000025c0)}, 0x800) 20:53:05 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000140)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0505405, &(0x7f0000000140)) 20:53:05 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="0a084e2404000000fe800000000000000000000000000013030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f167042022a908b3da2a12aa000000000000000000000000000000000000000000000000000000000000000000007e900000000000000000000000"], 0x1) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/55, 0x37) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') rt_sigprocmask(0x2, &(0x7f0000000080)={0x20}, &(0x7f0000000040), 0x8) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000005c0)=0x830, 0x4) listen(0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r3, &(0x7f0000000140)='./bus\x00', &(0x7f0000000340)=[&(0x7f0000000240)='loproc\x00', &(0x7f0000000300)='[}nodevnodev\x00'], &(0x7f0000000540)=[&(0x7f0000000380)=')\x00', &(0x7f00000003c0)='vboxnet0\x00', &(0x7f0000000400)='vboxnet1]*eth0\x00'], 0x1000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r2, &(0x7f0000000580)={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x1c) accept4$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000700)=0x14, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000b40)={@can={0x1d, r4}, {&(0x7f0000000740)=""/63, 0x3f}, &(0x7f0000000780), 0x2}, 0xa0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x317100, 0x0) socket$unix(0x1, 0x7, 0x0) write$tun(r5, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r6) ioctl(0xffffffffffffffff, 0xffffffffffffffb8, &(0x7f0000000040)) 20:53:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x60}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 20:53:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x2, 0x707000, 0xffffffffffffffff) 20:53:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000006, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x5300}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:53:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x6f6}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x107c}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) 20:53:06 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000140)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0505405, &(0x7f0000000140)) 20:53:06 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r0, 0xffffffffffffffff) 20:53:06 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1f, 0x0) close(r0) [ 1011.602314] kauditd_printk_skb: 188 callbacks suppressed [ 1011.602329] audit: type=1400 audit(1542919987.128:1974): avc: denied { prog_load } for pid=1279 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:53:07 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x53}, 0x0) ioctl(r0, 0xffffffffffffffbd, &(0x7f0000000200)) 20:53:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x6f6}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x107c}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) [ 1011.817761] audit: type=1400 audit(1542919987.138:1975): avc: denied { map } for pid=1277 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1011.928218] audit: type=1400 audit(1542919987.138:1976): avc: denied { map } for pid=1277 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.059759] audit: type=1400 audit(1542919987.218:1977): avc: denied { map } for pid=1277 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:07 executing program 2: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:07 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000140)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0505405, &(0x7f0000000140)) [ 1012.185263] audit: type=1400 audit(1542919987.228:1978): avc: denied { map } for pid=1277 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.284440] audit: type=1400 audit(1542919987.238:1979): avc: denied { prog_load } for pid=1279 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1012.416407] audit: type=1400 audit(1542919987.398:1980): avc: denied { map } for pid=1283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.625775] audit: type=1400 audit(1542919987.398:1981): avc: denied { map } for pid=1283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.782670] audit: type=1400 audit(1542919987.428:1982): avc: denied { map } for pid=1283 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.927893] audit: type=1400 audit(1542919987.428:1983): avc: denied { map } for pid=1283 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:09 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="0a084e2404000000fe800000000000000000000000000013030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f167042022a908b3da2a12aa000000000000000000000000000000000000000000000000000000000000000000007e900000000000000000000000"], 0x1) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/55, 0x37) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') rt_sigprocmask(0x2, &(0x7f0000000080)={0x20}, &(0x7f0000000040), 0x8) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000005c0)=0x830, 0x4) listen(0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r3, &(0x7f0000000140)='./bus\x00', &(0x7f0000000340)=[&(0x7f0000000240)='loproc\x00', &(0x7f0000000300)='[}nodevnodev\x00'], &(0x7f0000000540)=[&(0x7f0000000380)=')\x00', &(0x7f00000003c0)='vboxnet0\x00', &(0x7f0000000400)='vboxnet1]*eth0\x00'], 0x1000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r2, &(0x7f0000000580)={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x1c) accept4$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000700)=0x14, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000b40)={@can={0x1d, r4}, {&(0x7f0000000740)=""/63, 0x3f}, &(0x7f0000000780), 0x2}, 0xa0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x317100, 0x0) socket$unix(0x1, 0x7, 0x0) write$tun(r5, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r6) ioctl(0xffffffffffffffff, 0xffffffffffffffb8, &(0x7f0000000040)) 20:53:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x10}]}, &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0x3aa, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0xb}, 0x48) 20:53:09 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f00000001c0)=""/149, 0x70a2fa) 20:53:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f00000001c0)=0xc) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000480)={{0x0, r2}}) 20:53:09 executing program 1: clone(0xa0004500, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000480)="6f6f6d5f73636f72650089d906791eabd85c08c86ffe33265914fe20dc3c57364aa49c1eadadfbb4e53007b0a5a8a2687b244baf05d8dbc0ebb33397fed44b88ba5ce91423617615cd88178bb4513660736df420b058340e86004920f96de1988cf835f24265eb541d7fa203d71f6e5bb1deb37fb8cadbf4bf3cecd6c5c7f9727eb6f99205a17d20ebf2") pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000200), 0x8}) sendfile(r0, r0, &(0x7f0000000280)=0x7fffff9, 0x6) 20:53:09 executing program 2: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:09 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:09 executing program 3: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:09 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:10 executing program 1: clone(0xa0004500, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000480)="6f6f6d5f73636f72650089d906791eabd85c08c86ffe33265914fe20dc3c57364aa49c1eadadfbb4e53007b0a5a8a2687b244baf05d8dbc0ebb33397fed44b88ba5ce91423617615cd88178bb4513660736df420b058340e86004920f96de1988cf835f24265eb541d7fa203d71f6e5bb1deb37fb8cadbf4bf3cecd6c5c7f9727eb6f99205a17d20ebf2") pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000200), 0x8}) sendfile(r0, r0, &(0x7f0000000280)=0x7fffff9, 0x6) 20:53:10 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:10 executing program 2: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:11 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="0a084e2404000000fe800000000000000000000000000013030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f167042022a908b3da2a12aa000000000000000000000000000000000000000000000000000000000000000000007e900000000000000000000000"], 0x1) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/55, 0x37) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') rt_sigprocmask(0x2, &(0x7f0000000080)={0x20}, &(0x7f0000000040), 0x8) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000005c0)=0x830, 0x4) listen(0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r3, &(0x7f0000000140)='./bus\x00', &(0x7f0000000340)=[&(0x7f0000000240)='loproc\x00', &(0x7f0000000300)='[}nodevnodev\x00'], &(0x7f0000000540)=[&(0x7f0000000380)=')\x00', &(0x7f00000003c0)='vboxnet0\x00', &(0x7f0000000400)='vboxnet1]*eth0\x00'], 0x1000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r2, &(0x7f0000000580)={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x1c) accept4$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000700)=0x14, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000b40)={@can={0x1d, r4}, {&(0x7f0000000740)=""/63, 0x3f}, &(0x7f0000000780), 0x2}, 0xa0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x317100, 0x0) socket$unix(0x1, 0x7, 0x0) write$tun(r5, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r6) ioctl(0xffffffffffffffff, 0xffffffffffffffb8, &(0x7f0000000040)) 20:53:11 executing program 3: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:11 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:11 executing program 1: clone(0xa0004500, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000480)="6f6f6d5f73636f72650089d906791eabd85c08c86ffe33265914fe20dc3c57364aa49c1eadadfbb4e53007b0a5a8a2687b244baf05d8dbc0ebb33397fed44b88ba5ce91423617615cd88178bb4513660736df420b058340e86004920f96de1988cf835f24265eb541d7fa203d71f6e5bb1deb37fb8cadbf4bf3cecd6c5c7f9727eb6f99205a17d20ebf2") pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000200), 0x8}) sendfile(r0, r0, &(0x7f0000000280)=0x7fffff9, 0x6) 20:53:12 executing program 2: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') [ 1016.674635] kauditd_printk_skb: 147 callbacks suppressed [ 1016.674651] audit: type=1400 audit(1542919992.208:2131): avc: denied { map } for pid=1364 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:12 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') [ 1016.898641] audit: type=1400 audit(1542919992.218:2132): avc: denied { map } for pid=1364 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.068211] audit: type=1400 audit(1542919992.248:2133): avc: denied { map } for pid=1364 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.276083] audit: type=1400 audit(1542919992.258:2134): avc: denied { map } for pid=1364 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.419681] audit: type=1400 audit(1542919992.298:2135): avc: denied { map } for pid=1364 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:13 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') 20:53:13 executing program 3: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000180)=""/58) socket$kcm(0xa, 0x2, 0x11) getegid() stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1000000000000178, &(0x7f0000000740), 0xfffffffffffffda6}], 0x1, 0x880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000280)={0x0, 0x103, {0x6, 0x80, 0x4, 0x9e5}}) preadv(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x100000000000000) close(r2) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') [ 1017.563255] audit: type=1400 audit(1542919992.338:2136): avc: denied { map } for pid=1364 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:13 executing program 1: clone(0xa0004500, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000480)="6f6f6d5f73636f72650089d906791eabd85c08c86ffe33265914fe20dc3c57364aa49c1eadadfbb4e53007b0a5a8a2687b244baf05d8dbc0ebb33397fed44b88ba5ce91423617615cd88178bb4513660736df420b058340e86004920f96de1988cf835f24265eb541d7fa203d71f6e5bb1deb37fb8cadbf4bf3cecd6c5c7f9727eb6f99205a17d20ebf2") pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000200), 0x8}) sendfile(r0, r0, &(0x7f0000000280)=0x7fffff9, 0x6) [ 1017.735105] audit: type=1400 audit(1542919992.368:2137): avc: denied { associate } for pid=1362 comm="syz-executor3" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 1017.911353] audit: type=1400 audit(1542919992.378:2138): avc: denied { map } for pid=1364 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1018.120264] audit: type=1400 audit(1542919992.408:2139): avc: denied { map } for pid=1364 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x40000000000a, 0xa, 0x7, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f0000000000)="b2"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x10) [ 1018.309232] audit: type=1400 audit(1542919992.408:2140): avc: denied { map } for pid=1364 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x100000001}, {0x80}}) 20:53:14 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="0a084e2404000000fe800000000000000000000000000013030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f167042022a908b3da2a12aa000000000000000000000000000000000000000000000000000000000000000000007e900000000000000000000000"], 0x1) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/55, 0x37) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') rt_sigprocmask(0x2, &(0x7f0000000080)={0x20}, &(0x7f0000000040), 0x8) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000005c0)=0x830, 0x4) listen(0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r3, &(0x7f0000000140)='./bus\x00', &(0x7f0000000340)=[&(0x7f0000000240)='loproc\x00', &(0x7f0000000300)='[}nodevnodev\x00'], &(0x7f0000000540)=[&(0x7f0000000380)=')\x00', &(0x7f00000003c0)='vboxnet0\x00', &(0x7f0000000400)='vboxnet1]*eth0\x00'], 0x1000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r2, &(0x7f0000000580)={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x1c) accept4$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000700)=0x14, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000b40)={@can={0x1d, r4}, {&(0x7f0000000740)=""/63, 0x3f}, &(0x7f0000000780), 0x2}, 0xa0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x317100, 0x0) socket$unix(0x1, 0x7, 0x0) write$tun(r5, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r6) ioctl(0xffffffffffffffff, 0xffffffffffffffb8, &(0x7f0000000040)) 20:53:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000000)={0xec2}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000020000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:53:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x1c, 0x0, 0x20b, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@generic="06"]}]}, 0x1c}}, 0x0) 20:53:14 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x4040, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000580)={{0x3, 0x3f}, {0x1, 0x1}, 0x0, 0x1, 0x3}) r1 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000000c0)={0x0, 0x8000, 0x2000000000000002, {0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x15182c}}}) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000240)=0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10000, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000001040)={r2, 0x0, 0x1, "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"}) 20:53:14 executing program 4: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000000000000000000200ba0e0000000000000000000000000000000000000000000000000700000000001c00000000000000000000000000000000000000000000000000000000000000000000000000"]) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x248380, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={r1, 0x8}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) sched_setaffinity(r3, 0xffffffffffffffd9, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000008) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x383}, 0x7) ioctl$TIOCEXCL(r7, 0x540c) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r4, r7, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) write(r2, &(0x7f00000002c0)="ae433135ab1513aa05ae02186c4d65dcde3f0e269f260000000000000000000013000000000000000027c9fe78a7c49455bd041d454d6bfcfe47bf27c272cb11fe0839a8843a14c35c6abb5730a279494b165e8cb388b5be9343f13bf9336badabe6bd26948b5af842fcbb2d1629974057355b596cb48207000000000000005f", 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000580)={{0x0, 0x6, 0x17, 0x8c64}, 0x1, 0x100, 0x3f, r3, 0x2, 0x24d, 'syz1\x00', &(0x7f0000000540)=['cgroup,wlan0\\eth1@', "0000000000000000000000000200"], 0x20, [], [0xfffffffffffffff8, 0x0, 0x56, 0x9]}) 20:53:15 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000cc0)={0x0, 0x1}) 20:53:15 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "17dc3180e9f5386be7193ff7ac479193582f8753297d623c2e3bc8772575180b"}}) 20:53:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x58}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:53:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)="040300000309c14609005375c52cf7c21975e697b02f5c9eea1a4532469a96ff6b11876d886b7d21d8d207ccf7092508000000000000006fcfffffffffbe6215", 0x40, 0x0, &(0x7f0000000180)={0xa, 0x800, 0x4, @ipv4={[], [], @broadcast}}, 0x1c) 20:53:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000000c0)="1815ce42a3c4bbe1809ca63ad7f5f389f1a0df41", 0x14, 0x0, 0x0, 0x2, r2}, &(0x7f00000002c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x22, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c0000008ad685fb5bbc11c63ab6257f7455f67a9c789426543d33e7575d6248c9181b81c00c4fb8f8c57ac0764fe52b3274099d01ca3c76c3fd0c193f017dbfa389495e86f8adb73b78f965110704e23699a1601ec3ff4f34044278744699ad4d0cb17207ddaa0d30fc3a11974ad9100c5dcd2947c21b50a8dd80e37a67fc62632a99813dc754d29a78fbc9371ef31403", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) [ 1020.616939] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.623499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1020.630227] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.636666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1020.957283] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 20:53:16 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000001c0)=0xfffffffffffffffe, 0x4) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x2, 0x4fb) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) [ 1021.102059] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1021.194460] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:53:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffffffffffff000}, 0xc) [ 1021.343516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1021.442955] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1021.733424] kauditd_printk_skb: 140 callbacks suppressed [ 1021.733439] audit: type=1400 audit(1542919997.258:2281): avc: denied { map } for pid=1452 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1021.835824] audit: type=1400 audit(1542919997.268:2282): avc: denied { map } for pid=1452 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1021.938862] audit: type=1400 audit(1542919997.268:2283): avc: denied { map } for pid=1452 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.090025] audit: type=1400 audit(1542919997.268:2284): avc: denied { map } for pid=1452 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.177910] audit: type=1400 audit(1542919997.318:2285): avc: denied { map } for pid=1452 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:17 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002000006008, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000680), &(0x7f00000006c0)=0xc) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x1279, &(0x7f00000002c0)) 20:53:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000000c0)="1815ce42a3c4bbe1809ca63ad7f5f389f1a0df41", 0x14, 0x0, 0x0, 0x2, r2}, &(0x7f00000002c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x22, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c0000008ad685fb5bbc11c63ab6257f7455f67a9c789426543d33e7575d6248c9181b81c00c4fb8f8c57ac0764fe52b3274099d01ca3c76c3fd0c193f017dbfa389495e86f8adb73b78f965110704e23699a1601ec3ff4f34044278744699ad4d0cb17207ddaa0d30fc3a11974ad9100c5dcd2947c21b50a8dd80e37a67fc62632a99813dc754d29a78fbc9371ef31403", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) 20:53:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffffffffffff000}, 0xc) 20:53:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) [ 1022.333136] audit: type=1400 audit(1542919997.348:2286): avc: denied { map } for pid=1452 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.530628] audit: type=1400 audit(1542919997.348:2287): avc: denied { map } for pid=1452 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.657694] audit: type=1400 audit(1542919997.388:2288): avc: denied { create } for pid=1454 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:53:18 executing program 4: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000000000000000000200ba0e0000000000000000000000000000000000000000000000000700000000001c00000000000000000000000000000000000000000000000000000000000000000000000000"]) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x248380, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={r1, 0x8}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) sched_setaffinity(r3, 0xffffffffffffffd9, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000008) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x383}, 0x7) ioctl$TIOCEXCL(r7, 0x540c) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r4, r7, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) write(r2, &(0x7f00000002c0)="ae433135ab1513aa05ae02186c4d65dcde3f0e269f260000000000000000000013000000000000000027c9fe78a7c49455bd041d454d6bfcfe47bf27c272cb11fe0839a8843a14c35c6abb5730a279494b165e8cb388b5be9343f13bf9336badabe6bd26948b5af842fcbb2d1629974057355b596cb48207000000000000005f", 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000580)={{0x0, 0x6, 0x17, 0x8c64}, 0x1, 0x100, 0x3f, r3, 0x2, 0x24d, 'syz1\x00', &(0x7f0000000540)=['cgroup,wlan0\\eth1@', "0000000000000000000000000200"], 0x20, [], [0xfffffffffffffff8, 0x0, 0x56, 0x9]}) [ 1022.779593] audit: type=1400 audit(1542919997.398:2289): avc: denied { map } for pid=1452 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89e0, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970600dc0d") 20:53:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 1022.937174] audit: type=1400 audit(1542919997.418:2290): avc: denied { map } for pid=1452 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffffffffffff000}, 0xc) 20:53:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000000c0)="1815ce42a3c4bbe1809ca63ad7f5f389f1a0df41", 0x14, 0x0, 0x0, 0x2, r2}, &(0x7f00000002c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x22, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c0000008ad685fb5bbc11c63ab6257f7455f67a9c789426543d33e7575d6248c9181b81c00c4fb8f8c57ac0764fe52b3274099d01ca3c76c3fd0c193f017dbfa389495e86f8adb73b78f965110704e23699a1601ec3ff4f34044278744699ad4d0cb17207ddaa0d30fc3a11974ad9100c5dcd2947c21b50a8dd80e37a67fc62632a99813dc754d29a78fbc9371ef31403", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) [ 1023.729346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 20:53:19 executing program 0: mkdir(0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000600)) faccessat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x80, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="a60000002901003f000000100300000005000000000000000800000000000000a107002e2f66696c65300403000000000000000000000000100000000000000407002e2f66696c65302004000000000000000000000080000000000000000e07002e2f66696c65301201000000050000000000000000040000000000000707002e2f66496d0d5702aef6d780a1696c6531400200000005000000000000000300000000000000"], 0xa6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000280)='./file0\x00', 0x100000000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000940)={0x0, 0x7}, 0x8) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000980)={0x0, @in={{0x2, 0x4e20}}, 0x40, 0x4, 0xfffffffffffffffe, 0xfff, 0x20}, &(0x7f0000000a40)=0x98) clock_gettime(0x0, &(0x7f0000003340)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getpgid(0xffffffffffffffff) 20:53:19 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) [ 1024.254439] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:53:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) 20:53:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffffffffffff000}, 0xc) [ 1024.702998] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! 20:53:20 executing program 4: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000000000000000000200ba0e0000000000000000000000000000000000000000000000000700000000001c00000000000000000000000000000000000000000000000000000000000000000000000000"]) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x248380, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={r1, 0x8}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) sched_setaffinity(r3, 0xffffffffffffffd9, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000008) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x383}, 0x7) ioctl$TIOCEXCL(r7, 0x540c) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r4, r7, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) write(r2, &(0x7f00000002c0)="ae433135ab1513aa05ae02186c4d65dcde3f0e269f260000000000000000000013000000000000000027c9fe78a7c49455bd041d454d6bfcfe47bf27c272cb11fe0839a8843a14c35c6abb5730a279494b165e8cb388b5be9343f13bf9336badabe6bd26948b5af842fcbb2d1629974057355b596cb48207000000000000005f", 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000580)={{0x0, 0x6, 0x17, 0x8c64}, 0x1, 0x100, 0x3f, r3, 0x2, 0x24d, 'syz1\x00', &(0x7f0000000540)=['cgroup,wlan0\\eth1@', "0000000000000000000000000200"], 0x20, [], [0xfffffffffffffff8, 0x0, 0x56, 0x9]}) 20:53:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) 20:53:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000000c0)="1815ce42a3c4bbe1809ca63ad7f5f389f1a0df41", 0x14, 0x0, 0x0, 0x2, r2}, &(0x7f00000002c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x22, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c0000008ad685fb5bbc11c63ab6257f7455f67a9c789426543d33e7575d6248c9181b81c00c4fb8f8c57ac0764fe52b3274099d01ca3c76c3fd0c193f017dbfa389495e86f8adb73b78f965110704e23699a1601ec3ff4f34044278744699ad4d0cb17207ddaa0d30fc3a11974ad9100c5dcd2947c21b50a8dd80e37a67fc62632a99813dc754d29a78fbc9371ef31403", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) 20:53:21 executing program 0: mkdir(0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000600)) faccessat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x80, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="a60000002901003f000000100300000005000000000000000800000000000000a107002e2f66696c65300403000000000000000000000000100000000000000407002e2f66696c65302004000000000000000000000080000000000000000e07002e2f66696c65301201000000050000000000000000040000000000000707002e2f66496d0d5702aef6d780a1696c6531400200000005000000000000000300000000000000"], 0xa6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000280)='./file0\x00', 0x100000000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000940)={0x0, 0x7}, 0x8) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000980)={0x0, @in={{0x2, 0x4e20}}, 0x40, 0x4, 0xfffffffffffffffe, 0xfff, 0x20}, &(0x7f0000000a40)=0x98) clock_gettime(0x0, &(0x7f0000003340)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getpgid(0xffffffffffffffff) [ 1026.505093] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:53:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) 20:53:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) [ 1026.964581] kauditd_printk_skb: 144 callbacks suppressed [ 1026.964596] audit: type=1400 audit(1542920002.498:2435): avc: denied { map } for pid=1548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1027.117728] audit: type=1400 audit(1542920002.538:2436): avc: denied { map } for pid=1548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:22 executing program 1: mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001340), 0x4) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10001, 0x0) [ 1027.294008] audit: type=1400 audit(1542920002.548:2437): avc: denied { map } for pid=1548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) [ 1027.499843] audit: type=1400 audit(1542920002.558:2438): avc: denied { map } for pid=1548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1027.706369] audit: type=1400 audit(1542920002.628:2439): avc: denied { map } for pid=1548 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1027.886453] audit: type=1400 audit(1542920002.698:2440): avc: denied { map } for pid=1548 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1028.094359] audit: type=1400 audit(1542920002.778:2441): avc: denied { map } for pid=1548 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1028.332798] audit: type=1400 audit(1542920002.878:2442): avc: denied { map } for pid=1548 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) [ 1028.525318] audit: type=1400 audit(1542920002.898:2443): avc: denied { map } for pid=1548 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1028.550303] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:53:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) 20:53:24 executing program 0: mkdir(0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000600)) faccessat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x80, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="a60000002901003f000000100300000005000000000000000800000000000000a107002e2f66696c65300403000000000000000000000000100000000000000407002e2f66696c65302004000000000000000000000080000000000000000e07002e2f66696c65301201000000050000000000000000040000000000000707002e2f66496d0d5702aef6d780a1696c6531400200000005000000000000000300000000000000"], 0xa6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000280)='./file0\x00', 0x100000000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000940)={0x0, 0x7}, 0x8) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000980)={0x0, @in={{0x2, 0x4e20}}, 0x40, 0x4, 0xfffffffffffffffe, 0xfff, 0x20}, &(0x7f0000000a40)=0x98) clock_gettime(0x0, &(0x7f0000003340)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getpgid(0xffffffffffffffff) [ 1028.791942] audit: type=1400 audit(1542920002.958:2444): avc: denied { map } for pid=1548 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) 20:53:26 executing program 3: mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001340), 0x4) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10001, 0x0) 20:53:26 executing program 4: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000000000000000000200ba0e0000000000000000000000000000000000000000000000000700000000001c00000000000000000000000000000000000000000000000000000000000000000000000000"]) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x248380, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={r1, 0x8}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) sched_setaffinity(r3, 0xffffffffffffffd9, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000008) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x383}, 0x7) ioctl$TIOCEXCL(r7, 0x540c) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r4, r7, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) write(r2, &(0x7f00000002c0)="ae433135ab1513aa05ae02186c4d65dcde3f0e269f260000000000000000000013000000000000000027c9fe78a7c49455bd041d454d6bfcfe47bf27c272cb11fe0839a8843a14c35c6abb5730a279494b165e8cb388b5be9343f13bf9336badabe6bd26948b5af842fcbb2d1629974057355b596cb48207000000000000005f", 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000580)={{0x0, 0x6, 0x17, 0x8c64}, 0x1, 0x100, 0x3f, r3, 0x2, 0x24d, 'syz1\x00', &(0x7f0000000540)=['cgroup,wlan0\\eth1@', "0000000000000000000000000200"], 0x20, [], [0xfffffffffffffff8, 0x0, 0x56, 0x9]}) 20:53:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, 0x0, 0x1a, 0x1a0, 0x1}, 0x20) 20:53:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f00000000c0)=0x68) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2000000000000164, &(0x7f0000000040)}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x800, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="08000100"], 0x1}, 0x1, 0x0, 0x0, 0x8810}, 0x20000805) syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) 20:53:26 executing program 1: mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001340), 0x4) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10001, 0x0) 20:53:27 executing program 0: mkdir(0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000600)) faccessat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x80, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="a60000002901003f000000100300000005000000000000000800000000000000a107002e2f66696c65300403000000000000000000000000100000000000000407002e2f66696c65302004000000000000000000000080000000000000000e07002e2f66696c65301201000000050000000000000000040000000000000707002e2f66496d0d5702aef6d780a1696c6531400200000005000000000000000300000000000000"], 0xa6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000280)='./file0\x00', 0x100000000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000940)={0x0, 0x7}, 0x8) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000980)={0x0, @in={{0x2, 0x4e20}}, 0x40, 0x4, 0xfffffffffffffffe, 0xfff, 0x20}, &(0x7f0000000a40)=0x98) clock_gettime(0x0, &(0x7f0000003340)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getpgid(0xffffffffffffffff) 20:53:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000580)) r2 = socket(0x10, 0x4000000000000002, 0xc) write(r2, &(0x7f0000000140)="1f0000000102fffffd3b54c007110000f305010005000500000000000200cf", 0x1f) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0x2c9, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16=r1], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000440)={0x0, 0x7fffffff}, 0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000001c0)={0x7}, 0x7) [ 1032.009105] kauditd_printk_skb: 93 callbacks suppressed [ 1032.009151] audit: type=1400 audit(1542920007.538:2538): avc: denied { map } for pid=1604 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.257128] audit: type=1400 audit(1542920007.548:2539): avc: denied { map } for pid=1614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.451822] audit: type=1400 audit(1542920007.548:2540): avc: denied { map } for pid=1614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.596678] audit: type=1400 audit(1542920007.588:2541): avc: denied { map } for pid=1614 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.688370] audit: type=1400 audit(1542920007.598:2542): avc: denied { map } for pid=1614 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.722863] audit: type=1400 audit(1542920007.598:2543): avc: denied { map } for pid=1604 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.844040] audit: type=1400 audit(1542920007.648:2544): avc: denied { map } for pid=1604 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:28 executing program 1: mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001340), 0x4) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10001, 0x0) 20:53:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="b92e0300000f32670fc76d3266b827010f00d066b8eb000f00d848b8fb56ffffffffffff0f23d00f21f8353000000e0f23f8d86c9177440f01df430f01c8f266450f4f6f3467f30f2afc", 0x4a}], 0x1, 0x0, &(0x7f0000000280), 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'veth1_to_bridge\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="42000850cd"]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1033.031538] audit: type=1400 audit(1542920007.668:2545): avc: denied { map } for pid=1604 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:28 executing program 3: mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001340), 0x4) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10001, 0x0) [ 1033.180480] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1033.214061] audit: type=1400 audit(1542920007.668:2546): avc: denied { map } for pid=1604 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1033.379182] audit: type=1400 audit(1542920007.678:2547): avc: denied { map } for pid=1614 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1033.412295] netlink: 'syz-executor5': attribute type 5 has an invalid length. 20:53:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000180)={{0x4, @name="0191780965cc3cf954e465c1521b5b886c545d01aede5907b3f1dcb80ac4ac7f"}, 0x8, 0x3, 0x6}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$apparmor_current(r4, &(0x7f0000000200)=@hat={'permhat ', 0x4, 0x5e, ['\x00', 'mime_type\\selinuxmime_type{,&vboxnet0bdevvmnet0-\x00', '/dev/kvm\x00']}, 0x56) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:53:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 20:53:29 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xd}}, @icmp=@parameter_prob={0x8, 0x8, 0x0, 0x0, 0x14, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000040)) 20:53:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) bind$bt_hci(r1, &(0x7f0000000040), 0xc) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$sock_int(r3, 0x1, 0x21, &(0x7f00000000c0), 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={"74756e6c3000000000000000e0002000", 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) 20:53:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001440)=[{&(0x7f0000002000)="f534", 0x2}], 0x1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 20:53:30 executing program 1: mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001340), 0x4) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10001, 0x0) 20:53:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 20:53:31 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ashmem\x00', 0x4000, 0x0) 20:53:31 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xd}}, @icmp=@parameter_prob={0x8, 0x8, 0x0, 0x0, 0x14, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000040)) 20:53:32 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000340)={0xfffffff, 0x0, 0x6, [], &(0x7f00000002c0)={0x9d090f, 0x4, [], @p_u32=&(0x7f0000000180)=0x800}}) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000480)={0x2, 0x6, 0x26, "3894972556b0d7c26a79ee5f5c32665b758df76b4b57dc0adf3bab43679cb7942dd8224810e62d1349d71b315df30cb7c0335b77313a517dd9a1f99d", 0x2d, "fbbfff625aa9effec7c29ac26ba33e681d2f69b42ac40cc4cadb19050cdefd430e1c95d15a80d243c73278b2ad9a3c19c56966ebb56b68786442739f", 0x18}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x60000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x70bd2d}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000280), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x12}) close(r1) [ 1037.015700] kauditd_printk_skb: 114 callbacks suppressed [ 1037.015715] audit: type=1400 audit(1542920012.548:2662): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',lowerdir=.:file0']) lstat(&(0x7f0000001a00)='./file0/file0\x00', &(0x7f0000001a40)) [ 1037.329382] audit: type=1400 audit(1542920012.548:2663): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.483176] audit: type=1400 audit(1542920012.688:2664): avc: denied { map } for pid=1677 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.524426] audit: type=1400 audit(1542920012.798:2665): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.707168] audit: type=1400 audit(1542920012.798:2666): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.878625] audit: type=1400 audit(1542920012.878:2667): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1038.088596] audit: type=1400 audit(1542920012.908:2668): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1038.332702] audit: type=1400 audit(1542920012.948:2669): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:33 executing program 3: mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001340), 0x4) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10001, 0x0) 20:53:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x0, 0x8, 0x1}) 20:53:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 20:53:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xd}}, @icmp=@parameter_prob={0x8, 0x8, 0x0, 0x0, 0x14, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000040)) [ 1038.413109] audit: type=1400 audit(1542920012.988:2670): avc: denied { map } for pid=1677 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:34 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000340)={0xfffffff, 0x0, 0x6, [], &(0x7f00000002c0)={0x9d090f, 0x4, [], @p_u32=&(0x7f0000000180)=0x800}}) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000480)={0x2, 0x6, 0x26, "3894972556b0d7c26a79ee5f5c32665b758df76b4b57dc0adf3bab43679cb7942dd8224810e62d1349d71b315df30cb7c0335b77313a517dd9a1f99d", 0x2d, "fbbfff625aa9effec7c29ac26ba33e681d2f69b42ac40cc4cadb19050cdefd430e1c95d15a80d243c73278b2ad9a3c19c56966ebb56b68786442739f", 0x18}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x60000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x70bd2d}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000280), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x12}) close(r1) [ 1038.452650] audit: type=1400 audit(1542920013.148:2671): avc: denied { create } for pid=1681 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:53:34 executing program 1: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000740)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x2a7, &(0x7f0000000140)) 20:53:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) rmdir(&(0x7f0000000600)='./file0//ile0\x00') 20:53:34 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xd}}, @icmp=@parameter_prob={0x8, 0x8, 0x0, 0x0, 0x14, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000040)) 20:53:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 20:53:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000040), 0x4) 20:53:35 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000340)={0xfffffff, 0x0, 0x6, [], &(0x7f00000002c0)={0x9d090f, 0x4, [], @p_u32=&(0x7f0000000180)=0x800}}) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000480)={0x2, 0x6, 0x26, "3894972556b0d7c26a79ee5f5c32665b758df76b4b57dc0adf3bab43679cb7942dd8224810e62d1349d71b315df30cb7c0335b77313a517dd9a1f99d", 0x2d, "fbbfff625aa9effec7c29ac26ba33e681d2f69b42ac40cc4cadb19050cdefd430e1c95d15a80d243c73278b2ad9a3c19c56966ebb56b68786442739f", 0x18}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x60000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x70bd2d}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000280), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x12}) close(r1) 20:53:35 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) rmdir(&(0x7f0000000600)='./file0//ile0\x00') [ 1042.025238] kauditd_printk_skb: 121 callbacks suppressed [ 1042.025252] audit: type=1400 audit(1542920017.558:2793): avc: denied { map } for pid=1738 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.054398] audit: type=1400 audit(1542920017.558:2794): avc: denied { map } for pid=1738 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.077872] audit: type=1400 audit(1542920017.568:2795): avc: denied { map } for pid=1738 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.104278] audit: type=1400 audit(1542920017.568:2796): avc: denied { map } for pid=1738 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.129704] audit: type=1400 audit(1542920017.578:2797): avc: denied { map } for pid=1738 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.153963] audit: type=1400 audit(1542920017.618:2798): avc: denied { map } for pid=1738 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.180119] audit: type=1400 audit(1542920017.618:2799): avc: denied { map } for pid=1738 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.206640] audit: type=1400 audit(1542920017.658:2800): avc: denied { map } for pid=1738 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.232126] audit: type=1400 audit(1542920017.658:2801): avc: denied { map } for pid=1738 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.313952] audit: type=1400 audit(1542920017.708:2802): avc: denied { map } for pid=1738 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:38 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000340)={0xfffffff, 0x0, 0x6, [], &(0x7f00000002c0)={0x9d090f, 0x4, [], @p_u32=&(0x7f0000000180)=0x800}}) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000480)={0x2, 0x6, 0x26, "3894972556b0d7c26a79ee5f5c32665b758df76b4b57dc0adf3bab43679cb7942dd8224810e62d1349d71b315df30cb7c0335b77313a517dd9a1f99d", 0x2d, "fbbfff625aa9effec7c29ac26ba33e681d2f69b42ac40cc4cadb19050cdefd430e1c95d15a80d243c73278b2ad9a3c19c56966ebb56b68786442739f", 0x18}) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x60000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x70bd2d}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000280), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x12}) close(r1) 20:53:38 executing program 0: r0 = gettid() mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000200)) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'ip6gretap0\x00'}) ptrace(0x10, r0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 20:53:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfd06) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") recvmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/161, 0xa1}], 0x1, &(0x7f0000000b00)=""/249, 0xf9}}, {{&(0x7f0000000f00)=@ax25, 0x80, &(0x7f0000001340)=[{&(0x7f0000001080)=""/91, 0x5b}], 0x1, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, 0x0) 20:53:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) rmdir(&(0x7f0000000600)='./file0//ile0\x00') 20:53:38 executing program 1: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000740)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x2a7, &(0x7f0000000140)) 20:53:38 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x1ecac}], 0x1, &(0x7f0000002a40)}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0xfc99}], 0x1}, 0x0) close(r0) 20:53:38 executing program 1: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000740)={0x8, "da9f75b1f22ff6ec0143611cb96057eed3115a166f3f7de5c2294883f6b663ca33bf5986493b61d5915a83c2d317c4997c5deeca80c4d4ab080179d142390f1a1ef8b7de71546663cb163c6014a840562e5febb02c590ebb7889fe1077dd88b56cb553b58d54b57a103d67ae74208610613f159540381b86ebb0fccdc2695b6dddd1b48d1bae92c5b4150bf5c6c127130d3ca456f3898500ed0fb6f35b5512697f8008a55cb530be832f1e5da7b4b5242952d79d31d66afbf11716bf66912b958cff937d9eff6872448c52017094d7266be9451c626b04490776cece63cd1a87c56addab482bb49138c0de8243ab4dfb0ca567a5728a8b47a81f50a7405cc0eabdf603c1981d073e59cf1f5fc665758e9a048b056f211b7cca59eaab35603d2553e4f3be8c0b1457aa9f7319d807cce9cab4e0aae5d3b0a6148e97a0e0b88557d81a17593ab63b84ddddd8a252687acd9c4161b5c33c6cd969146dcfdb7435b6062c1cadb039a52f1dc327b4915a47bcb97e151f83339cd1ab65d874779cd77217d8a57a8de40a61dbc5633c8dc8e8ceeda51169bc8e60156b01a813dfc9bcea71e6985504db7f3349ba286940fea6f4ce9bcb81110b5ff97c171f6cc9f822059c8b62341846f24d3568b5fae4ba0065c9e71c7ead7262bb5d68574795264a385c40f938ceb180eb294b00520218bda7f8d3c6dafd820db4d0e985fd54e23cc51088663eb79e104bce18021f6c683f80f1764ea958d60e27ad547ab389dc70a56bdf1a3f5a941f03f5a3e26c4be5be77efb96b630cf33e166d799b1cc16787638a40d1072756811248a9574c2464c208fbe664645b6af40cabac340eb9249a546c11f253e5b9296d1dcb30262f326209c760438ced2d1f685866471d6bf4247b7b12055f5ae5082d2b2e27ac8b3c3554cf06a2263e629012625596a6759de206c7a58383bd22f22b2ca762bcbb2020ea495c97c5ae1296f7bc48caa046c8b412aa215159d6c6856f36e4c5948d4f088445b121a26d33ccdefd313678644028de377e75382c403817d0685e1e08bd3958750197edc253b26dfae03e5ca715823c27007822902e4191e4ee462db10a076517e7269814219a0263e4d869b097fecb8085f3eca9c04952b4ff56ea486103db8fb0fb7cab5fdd277ac372463a666d83e1cc65b38ec18477d64cfbdec70e639308f1e64492b29e2a32985097a9e54e7ffefea7fc8163a84ddcca0cfa732fb33458f81661740136f3c7077766876d58b6eeba1fcf980185c908cc7f1f2537ddef305cbcea330a8c1dbcc3ce076510940e6fe660dcdc7ae66df03bf7e90eef6a7e47285a46bf29fc5c4099763d30f1d62617660a47fe5441b4bbe4fc5cfa8e856d91bf41d58d729730d40f583d3164c2205cea2cae867794a8a3616dc4404c0f158348e831c68d55a318787b3ee7c5a8aa3f0d569bc84187fc27224a7f5a4d0a50d8f2828a2def27bda8035b1025d40fa3f1791c3ede076fcf6b18debd23b0fdc8b39c03a15f0c7ba6ba0c46eb109399601c89e9c92e2c4b07727a16755ef80d6556a8a763369c7554605c4950c103d3731c6f2f9de2a3fe6c4234b8bcffe96640f64ca800d38f8b55a2567e96d7e3d51e14733871f694042c97a974c34b45e547705a1e2cc2d618f343a3e84187ac9b682f0164e441b41dd5c71310f36c27188ff4d34abc47d187911a2449b10ea844d690397b4000e997192871c0a67093fa9d865af3f7751ebc9a1a020267501f09017f961e9cbb95a0c35ffcbce37966b99127ff106b10168af6fd3a08e3612252d6ba07cca554b9b9824b7b34375e08aff207d6d304ad5e384444f2c390480f60b472294c5951b35e5ea16e98e9602e585455121c8a71abe56c01a19043fd4b8f344628d52fe298234c0f192a4fa94aeb0e61b376ab1de09946e8b0d7bd8be0353466cfca3791782d5943a68afb5bc969eb5a420744bf7da561511b9d6854feb5e6c5e93951c11de24055f840c6f7dabe65ce0ff0e3d1d3bb7ef009f0ae29b8c9c714d50daded464def403f82af4fea40a3591645f696dfde4f6e17aab9d8baa7178e9cd0cc1fef1e635b261fbce0c1dd9dcfa79bf04137dc5e209fd74714c94ae958a6298bf9fbe8c4669a22279f2e0e395d3c8051a747b35d872d0322f40d75287887dcede5f7847a32f42316d3cba199ff154e8bcf5015f91bc1b96528342ec659111ed158ee13f428414ebd1ecd7cf174b3ffd9cbe9e3336dfaacc94e224eb53f81c1a201065388ce6f65d08f0c61127d2e5a9bbd383c3cc48b57121452f52a1cb74e3eeca5ddc1693230310b96300d26e959f827b836d65d9eb6afd06a6c5a647780e64b2f4c10792fd8c11951c66883c88b985d3dc39d4c9ce45159903adbeeb8d91e0f1ddb2ef9067f4ea6361e1f6fbc384449639aae4c8a8f43b3235e5c1289b4289a954c218426d4aaa23ffa9d64369da35cab45c0bad9bcf69fb6dff11007199184466373089463238df911ba4377d2eb6212ef2b684edbaad43a963e3bc120c106c41c7a7097216f4a0c9d6afbc34323be6c899e9f7ba632bf17a232d37b554e75666a3d6bdb6729f923d2b5204c0993f015892df62aa99fdc28cffb87924fba6f6cac422f2add253007b476b44fecd1b98cfd51c2d652c6f3e1e31c1949d4af5476ba87b7f9c2b61ac444fc01efbcfc9d25e921b42cc278406c4ba3377342abab8616d844f68716dd28bfc26d8001f291309c4eb10a73d50da8860d9158f86d308189d3b677ec8d9b449e9b8e6463f7ffa963c3dfd0c40b2edc6a85ef3af4c9bc77bddd54d685ea0c1d0eb99e1acd73a53ff69d3c228e29a95726bf879d885ec03eeb9ab9fba0b3d05e1bae0100ebeb6540c4537df8438cdb56c1258f5124c032b0022f6beafe2b9514def05480b8b7a1e5148a921b50fa2af1242b07cb8f6312ddcfe4c4be3886f39cb472d96f6c978551c58bdd42237bf3430c2b5b4ad8038ed8d9efc7195248cdea622d3708e4f60122c93470334cd133a52f2cfd903cd2c93d072f45e6ed2592957be23167d5a4ff6a70d548705eeaeb498a9d0e1fc114ebb019116202e9e146bd5dbf57364d0e948fb984d2f0bfd5392cdeff432e2303f8e5b86abd17db02e26eba033cebf4b5a56dbd4d5e0e8a00df906fbb52dda24f9cdc6bccf60f02d0a15fe9916e49331b82f24d1a7c0b865655797773301f0018a3f2506fcd14e3a77a70c0aa881336e69b84db38379d4cf9430a3a0966db1ffb08416fbe59fd46eac2fa7630e2c8956d23cd5e4eb9fb2db24ef371f17908a9534cee0698b066c6f339258f8962a46fec0e579e8abe80b5d83dd38dc57af300f1dde8c5ce204066b07504fd4fa22e363b157d04413da3c3268363289def57c9eabb1e9d3acb92a396ded10f2aef41b3fb3e52dca7aaeb18ac3d35c74e5e87b64a0a6aa8dbb1b09a570dbdfeabea18b3b12a74dd0f3c0ba1c50a15b8e552a7f1bc7a40d2e9afaf16f0ddeda2924f3000dc90f5367b410fdecee4c58ad44d119a492c5ff4754720c4a5c4248d71aa0ed9407485fe1ff9b987433cec032104b1f4dea199cb91110422647f153be5f4321191493f40027a40e9f050017e510280806767245791af232be83ee2a5c96ecad21ea56b054e8e1d0875c62c7f656ad69152e5e0abb3253fe53acf5dac100b477c4e92428c42ba3f8f704b5fe51627ea03302afaf257855e33853659818fc565de6631a23c43c663cd4206362a8da0c7ee68eb17ad6f2c3bce583b62547c1ea70e6bd0cfa92f551c8ccd8703fd16f67fa5c6d80e37a166e3720b49f2a7a0beca1f3b9cd0f5861ed42b8d9b1ae95af6c21b41890463a5298e546fb06c42efed369df3df4474431cfb814a950c19a0228c02c91a97247c612e35706360a8bc3b22b59ab49c353ce6a60aafee4fc19c906b23c4f08d976122e29ace0099ac5a5852bf886e5b1d9d81d0da5c915d157f1417350a7702aafd1a5543cc5f0a04ba3df73626d42572b5a03a230b79ae9df8a611196ffb1038fb5d90edaad5b0beeeaf9ef1134532fb27bfac953bb446d0dd2f0c601f41e3b25a579de70ae00b096d295dd09eb5063229f4d15877907162e86ae461e6a7a06095400d4d8f3c7d670c55363511364a66666a5aee1d4bac53cd85c7fa5b5ad66759961c0fc6f2178c5fbb666bb41d7698f5211bbbb0ded7b72194bebbfc24619e15c78484a19298698c882cfe31bf8e46a048ecb5d8d3d8093247b72159117d7e40d5c091601ba53709e2d687411cf73fcf6879db72a52aae0744f16dc0055c78e6ed80fe186dedfbabb4431d4d38ce9dd36dc4a8a4e4b87ffe01490f3ac94144cd4d98c0b74934ef64b015f4c5ffad7deb0df8242891e9df51ccd8416286c99ab9d664dfe82f061f470780518ef5f92f31b4e5d32997d8d1c39fa47d92ac10c40c2ce2101451ef2cc40f419ea95f81e62c9b418e370b5e5c0cedaac538c30d98e24c20b99659363ad1b23d030652acefeeb3498313bcbce3d2e2e6881af1e1fe8ba55094bd7af8bc5f1501168d9de6192199268c5a26d72db349be9796ae10ce1d5455a1f10960667d877225ed9e60a4657994c68bd7bc260a537795e9496cfd72dc1744f03a275528da5622f128baacd35c628d196318bc2e89889c604f5398a5b2db8424654ccb6dd1632d0990fae397ba180e99325647f16ed085a6519c74c662c233591127a86c359f3cef7e3e8461c8cee256c363d412f0b2df0e5d2329de19426887883aa61a748173f5ffbc06815fe113ce38f1a3b0b32a44421c8d5b51144fb4d4c343322a155f2debedcaad46dc063ea171666f40dc444b15ac097f0082de0ded4210199a0423d0995d36c3381c702b3345f62fe0e2ccadfe168aa84d7fa0f358c47aaa9270d3face4ded09be373a8c48044bd5eb6b752157714f4070bf80306d66304556101a5c4d9ce039c3efadcd32636c49d062e859cd8efff6e572c62303083ec87b408989cb34afd268ccca34909c8ef5dbefd5b17cc8901443f06c298030ef777794f43cbad6e749b9c06d8b63fb1c6d5f2c8d60526a2f10aa1b3fb9a0329ce3d01d6c014534983cbcb3179a06321b59f02357f84e6cfc7e59215a2efdfbfb6db7e877f4fb069cf39258f4b50eb23741eb0ce142785277a2f3015df980bb349c57f4d0787d10b960c815bdf4988c42423474249af62c3297fbde9dbe87d560cb1f55d00a4bc229f48cf8a6069fd72162e67246865762f8ef999cfc595b3a643e3660345aa2f846bc5c3353ca8a30953d4a37ed66a7de11f935a0484ede383010e42d091f80d8577cdbb14db73cccc33d3301d652205a34c285e3a94426689d3dfc0e65efab797deea92ef5dae0bfec10aa62c9a37bac333b78b86088ae8858ed0add05624e63e1b1ad697dc64f585ea2c1362c8aeacaa5059e0f615f94c4629af5d2517bffb30f94893ee2cb915c58a63748b2564ab1320a19d3f807d42d884333464649210919d0dbbcaf749215b829f63f84d7434e9e41a56ddd191a5a7ea4134e3aead273350e5d0b0ff72cd703250b287977ca198580c28a491605bf35af78d3b1131935b09360cac0f382ebaa73bbd235df676eec080ecf602e8fd97e3cd667e63b851368794f7aafca914cdd14f160a576762f5398d1ace7278ece62c053aa64d853728c57d53cdee9c045a771ec29781ecb8a5758febabf3bfa4de55d4257d26fb0561e6cdff60fdc891d977d20c8bb63063622cb6d4a224d9e5a697e817e5c98f168b5f173b245a98cfa5e4459", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x2a7, &(0x7f0000000140)) 20:53:38 executing program 5: open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='.\x00', 0x40224000000b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000040)) close(r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'veth1_to_team\x00'}, 0x18) 20:53:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) rmdir(&(0x7f0000000600)='./file0//ile0\x00') 20:53:38 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000006, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f00000015c0), &(0x7f0000000040)=0x4) 20:53:39 executing program 1: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000740)={0x8, "da9f75b1f22ff6ec0143611cb96057eed3115a166f3f7de5c2294883f6b663ca33bf5986493b61d5915a83c2d317c4997c5deeca80c4d4ab080179d142390f1a1ef8b7de71546663cb163c6014a840562e5febb02c590ebb7889fe1077dd88b56cb553b58d54b57a103d67ae74208610613f159540381b86ebb0fccdc2695b6dddd1b48d1bae92c5b4150bf5c6c127130d3ca456f3898500ed0fb6f35b5512697f8008a55cb530be832f1e5da7b4b5242952d79d31d66afbf11716bf66912b958cff937d9eff6872448c52017094d7266be9451c626b04490776cece63cd1a87c56addab482bb49138c0de8243ab4dfb0ca567a5728a8b47a81f50a7405cc0eabdf603c1981d073e59cf1f5fc665758e9a048b056f211b7cca59eaab35603d2553e4f3be8c0b1457aa9f7319d807cce9cab4e0aae5d3b0a6148e97a0e0b88557d81a17593ab63b84ddddd8a252687acd9c4161b5c33c6cd969146dcfdb7435b6062c1cadb039a52f1dc327b4915a47bcb97e151f83339cd1ab65d874779cd77217d8a57a8de40a61dbc5633c8dc8e8ceeda51169bc8e60156b01a813dfc9bcea71e6985504db7f3349ba286940fea6f4ce9bcb81110b5ff97c171f6cc9f822059c8b62341846f24d3568b5fae4ba0065c9e71c7ead7262bb5d68574795264a385c40f938ceb180eb294b00520218bda7f8d3c6dafd820db4d0e985fd54e23cc51088663eb79e104bce18021f6c683f80f1764ea958d60e27ad547ab389dc70a56bdf1a3f5a941f03f5a3e26c4be5be77efb96b630cf33e166d799b1cc16787638a40d1072756811248a9574c2464c208fbe664645b6af40cabac340eb9249a546c11f253e5b9296d1dcb30262f326209c760438ced2d1f685866471d6bf4247b7b12055f5ae5082d2b2e27ac8b3c3554cf06a2263e629012625596a6759de206c7a58383bd22f22b2ca762bcbb2020ea495c97c5ae1296f7bc48caa046c8b412aa215159d6c6856f36e4c5948d4f088445b121a26d33ccdefd313678644028de377e75382c403817d0685e1e08bd3958750197edc253b26dfae03e5ca715823c27007822902e4191e4ee462db10a076517e7269814219a0263e4d869b097fecb8085f3eca9c04952b4ff56ea486103db8fb0fb7cab5fdd277ac372463a666d83e1cc65b38ec18477d64cfbdec70e639308f1e64492b29e2a32985097a9e54e7ffefea7fc8163a84ddcca0cfa732fb33458f81661740136f3c7077766876d58b6eeba1fcf980185c908cc7f1f2537ddef305cbcea330a8c1dbcc3ce076510940e6fe660dcdc7ae66df03bf7e90eef6a7e47285a46bf29fc5c4099763d30f1d62617660a47fe5441b4bbe4fc5cfa8e856d91bf41d58d729730d40f583d3164c2205cea2cae867794a8a3616dc4404c0f158348e831c68d55a318787b3ee7c5a8aa3f0d569bc84187fc27224a7f5a4d0a50d8f2828a2def27bda8035b1025d40fa3f1791c3ede076fcf6b18debd23b0fdc8b39c03a15f0c7ba6ba0c46eb109399601c89e9c92e2c4b07727a16755ef80d6556a8a763369c7554605c4950c103d3731c6f2f9de2a3fe6c4234b8bcffe96640f64ca800d38f8b55a2567e96d7e3d51e14733871f694042c97a974c34b45e547705a1e2cc2d618f343a3e84187ac9b682f0164e441b41dd5c71310f36c27188ff4d34abc47d187911a2449b10ea844d690397b4000e997192871c0a67093fa9d865af3f7751ebc9a1a020267501f09017f961e9cbb95a0c35ffcbce37966b99127ff106b10168af6fd3a08e3612252d6ba07cca554b9b9824b7b34375e08aff207d6d304ad5e384444f2c390480f60b472294c5951b35e5ea16e98e9602e585455121c8a71abe56c01a19043fd4b8f344628d52fe298234c0f192a4fa94aeb0e61b376ab1de09946e8b0d7bd8be0353466cfca3791782d5943a68afb5bc969eb5a420744bf7da561511b9d6854feb5e6c5e93951c11de24055f840c6f7dabe65ce0ff0e3d1d3bb7ef009f0ae29b8c9c714d50daded464def403f82af4fea40a3591645f696dfde4f6e17aab9d8baa7178e9cd0cc1fef1e635b261fbce0c1dd9dcfa79bf04137dc5e209fd74714c94ae958a6298bf9fbe8c4669a22279f2e0e395d3c8051a747b35d872d0322f40d75287887dcede5f7847a32f42316d3cba199ff154e8bcf5015f91bc1b96528342ec659111ed158ee13f428414ebd1ecd7cf174b3ffd9cbe9e3336dfaacc94e224eb53f81c1a201065388ce6f65d08f0c61127d2e5a9bbd383c3cc48b57121452f52a1cb74e3eeca5ddc1693230310b96300d26e959f827b836d65d9eb6afd06a6c5a647780e64b2f4c10792fd8c11951c66883c88b985d3dc39d4c9ce45159903adbeeb8d91e0f1ddb2ef9067f4ea6361e1f6fbc384449639aae4c8a8f43b3235e5c1289b4289a954c218426d4aaa23ffa9d64369da35cab45c0bad9bcf69fb6dff11007199184466373089463238df911ba4377d2eb6212ef2b684edbaad43a963e3bc120c106c41c7a7097216f4a0c9d6afbc34323be6c899e9f7ba632bf17a232d37b554e75666a3d6bdb6729f923d2b5204c0993f015892df62aa99fdc28cffb87924fba6f6cac422f2add253007b476b44fecd1b98cfd51c2d652c6f3e1e31c1949d4af5476ba87b7f9c2b61ac444fc01efbcfc9d25e921b42cc278406c4ba3377342abab8616d844f68716dd28bfc26d8001f291309c4eb10a73d50da8860d9158f86d308189d3b677ec8d9b449e9b8e6463f7ffa963c3dfd0c40b2edc6a85ef3af4c9bc77bddd54d685ea0c1d0eb99e1acd73a53ff69d3c228e29a95726bf879d885ec03eeb9ab9fba0b3d05e1bae0100ebeb6540c4537df8438cdb56c1258f5124c032b0022f6beafe2b9514def05480b8b7a1e5148a921b50fa2af1242b07cb8f6312ddcfe4c4be3886f39cb472d96f6c978551c58bdd42237bf3430c2b5b4ad8038ed8d9efc7195248cdea622d3708e4f60122c93470334cd133a52f2cfd903cd2c93d072f45e6ed2592957be23167d5a4ff6a70d548705eeaeb498a9d0e1fc114ebb019116202e9e146bd5dbf57364d0e948fb984d2f0bfd5392cdeff432e2303f8e5b86abd17db02e26eba033cebf4b5a56dbd4d5e0e8a00df906fbb52dda24f9cdc6bccf60f02d0a15fe9916e49331b82f24d1a7c0b865655797773301f0018a3f2506fcd14e3a77a70c0aa881336e69b84db38379d4cf9430a3a0966db1ffb08416fbe59fd46eac2fa7630e2c8956d23cd5e4eb9fb2db24ef371f17908a9534cee0698b066c6f339258f8962a46fec0e579e8abe80b5d83dd38dc57af300f1dde8c5ce204066b07504fd4fa22e363b157d04413da3c3268363289def57c9eabb1e9d3acb92a396ded10f2aef41b3fb3e52dca7aaeb18ac3d35c74e5e87b64a0a6aa8dbb1b09a570dbdfeabea18b3b12a74dd0f3c0ba1c50a15b8e552a7f1bc7a40d2e9afaf16f0ddeda2924f3000dc90f5367b410fdecee4c58ad44d119a492c5ff4754720c4a5c4248d71aa0ed9407485fe1ff9b987433cec032104b1f4dea199cb91110422647f153be5f4321191493f40027a40e9f050017e510280806767245791af232be83ee2a5c96ecad21ea56b054e8e1d0875c62c7f656ad69152e5e0abb3253fe53acf5dac100b477c4e92428c42ba3f8f704b5fe51627ea03302afaf257855e33853659818fc565de6631a23c43c663cd4206362a8da0c7ee68eb17ad6f2c3bce583b62547c1ea70e6bd0cfa92f551c8ccd8703fd16f67fa5c6d80e37a166e3720b49f2a7a0beca1f3b9cd0f5861ed42b8d9b1ae95af6c21b41890463a5298e546fb06c42efed369df3df4474431cfb814a950c19a0228c02c91a97247c612e35706360a8bc3b22b59ab49c353ce6a60aafee4fc19c906b23c4f08d976122e29ace0099ac5a5852bf886e5b1d9d81d0da5c915d157f1417350a7702aafd1a5543cc5f0a04ba3df73626d42572b5a03a230b79ae9df8a611196ffb1038fb5d90edaad5b0beeeaf9ef1134532fb27bfac953bb446d0dd2f0c601f41e3b25a579de70ae00b096d295dd09eb5063229f4d15877907162e86ae461e6a7a06095400d4d8f3c7d670c55363511364a66666a5aee1d4bac53cd85c7fa5b5ad66759961c0fc6f2178c5fbb666bb41d7698f5211bbbb0ded7b72194bebbfc24619e15c78484a19298698c882cfe31bf8e46a048ecb5d8d3d8093247b72159117d7e40d5c091601ba53709e2d687411cf73fcf6879db72a52aae0744f16dc0055c78e6ed80fe186dedfbabb4431d4d38ce9dd36dc4a8a4e4b87ffe01490f3ac94144cd4d98c0b74934ef64b015f4c5ffad7deb0df8242891e9df51ccd8416286c99ab9d664dfe82f061f470780518ef5f92f31b4e5d32997d8d1c39fa47d92ac10c40c2ce2101451ef2cc40f419ea95f81e62c9b418e370b5e5c0cedaac538c30d98e24c20b99659363ad1b23d030652acefeeb3498313bcbce3d2e2e6881af1e1fe8ba55094bd7af8bc5f1501168d9de6192199268c5a26d72db349be9796ae10ce1d5455a1f10960667d877225ed9e60a4657994c68bd7bc260a537795e9496cfd72dc1744f03a275528da5622f128baacd35c628d196318bc2e89889c604f5398a5b2db8424654ccb6dd1632d0990fae397ba180e99325647f16ed085a6519c74c662c233591127a86c359f3cef7e3e8461c8cee256c363d412f0b2df0e5d2329de19426887883aa61a748173f5ffbc06815fe113ce38f1a3b0b32a44421c8d5b51144fb4d4c343322a155f2debedcaad46dc063ea171666f40dc444b15ac097f0082de0ded4210199a0423d0995d36c3381c702b3345f62fe0e2ccadfe168aa84d7fa0f358c47aaa9270d3face4ded09be373a8c48044bd5eb6b752157714f4070bf80306d66304556101a5c4d9ce039c3efadcd32636c49d062e859cd8efff6e572c62303083ec87b408989cb34afd268ccca34909c8ef5dbefd5b17cc8901443f06c298030ef777794f43cbad6e749b9c06d8b63fb1c6d5f2c8d60526a2f10aa1b3fb9a0329ce3d01d6c014534983cbcb3179a06321b59f02357f84e6cfc7e59215a2efdfbfb6db7e877f4fb069cf39258f4b50eb23741eb0ce142785277a2f3015df980bb349c57f4d0787d10b960c815bdf4988c42423474249af62c3297fbde9dbe87d560cb1f55d00a4bc229f48cf8a6069fd72162e67246865762f8ef999cfc595b3a643e3660345aa2f846bc5c3353ca8a30953d4a37ed66a7de11f935a0484ede383010e42d091f80d8577cdbb14db73cccc33d3301d652205a34c285e3a94426689d3dfc0e65efab797deea92ef5dae0bfec10aa62c9a37bac333b78b86088ae8858ed0add05624e63e1b1ad697dc64f585ea2c1362c8aeacaa5059e0f615f94c4629af5d2517bffb30f94893ee2cb915c58a63748b2564ab1320a19d3f807d42d884333464649210919d0dbbcaf749215b829f63f84d7434e9e41a56ddd191a5a7ea4134e3aead273350e5d0b0ff72cd703250b287977ca198580c28a491605bf35af78d3b1131935b09360cac0f382ebaa73bbd235df676eec080ecf602e8fd97e3cd667e63b851368794f7aafca914cdd14f160a576762f5398d1ace7278ece62c053aa64d853728c57d53cdee9c045a771ec29781ecb8a5758febabf3bfa4de55d4257d26fb0561e6cdff60fdc891d977d20c8bb63063622cb6d4a224d9e5a697e817e5c98f168b5f173b245a98cfa5e4459", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x2a7, &(0x7f0000000140)) 20:53:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0xe135) 20:53:39 executing program 5: open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='.\x00', 0x40224000000b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000040)) close(r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'veth1_to_team\x00'}, 0x18) 20:53:41 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000006, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f00000015c0), &(0x7f0000000040)=0x4) 20:53:41 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r1, 0x8000000000009371, &(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000700)="0203000000145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1000000000006, 0x7) ioctl(r2, 0x60, &(0x7f0000000740)="004a1c9407") getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000180)={'team0\x00', r4}) r6 = socket$inet6(0xa, 0x6, 0x800) bind$inet6(r6, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'veth0\x00', r5}) listen(r1, 0x801000007ffc) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f0000000480)) socket$inet_dccp(0x2, 0x6, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3a) syz_emit_ethernet(0x1, &(0x7f00000008c0)=ANY=[@ANYRESDEC=r7], &(0x7f0000000040)={0x1, 0x1, [0xcbc, 0x10, 0xc2e, 0x99]}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f00000002c0)=0x5, 0x4) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)='lo{\x00'}, 0x10) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r8, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e20, 0x9, @local, 0xfffffffffffffae5}, {0xa, 0x4e20, 0x101, @local, 0x9}, 0xfffffffffffffbff, [0x4, 0x5, 0x8, 0x1f, 0x9, 0xfffffffffffffff9, 0x1, 0x2]}, 0x5c) setsockopt$inet6_int(r3, 0x29, 0xcb, &(0x7f0000000100)=0x3ff, 0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r8, 0x400448c8, &(0x7f00000029c0)=ANY=[@ANYBLOB="400001000600800081ffff44b20920b3ee3cc417145ac80800005713"]) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x4e23, 0x7fff, @empty, 0x3}, {0xa, 0x4e23, 0xffffffff, @mcast1, 0xfffffffffffffff7}, 0x9, [0x7, 0x8be, 0x83e, 0xb4, 0x1, 0x7, 0x7, 0xfffffffffffffc00]}, 0xc0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @empty, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x101, @local, 0x281}, {0xa, 0x4e23, 0x82d, @mcast1, 0x7}, 0x7, [0x1, 0x7d, 0xbc6, 0x4, 0x9, 0x1, 0x4, 0xffffffffffffffff]}, 0x5c) 20:53:41 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 20:53:41 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xffffff7f}, 0x80, &(0x7f00000001c0)}, 0x0) 20:53:41 executing program 5: open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='.\x00', 0x40224000000b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000040)) close(r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'veth1_to_team\x00'}, 0x18) 20:53:41 executing program 1: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 20:53:41 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000006, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f00000015c0), &(0x7f0000000040)=0x4) 20:53:41 executing program 5: open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='.\x00', 0x40224000000b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000040)) close(r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'veth1_to_team\x00'}, 0x18) 20:53:41 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 20:53:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 20:53:42 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000006, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f00000015c0), &(0x7f0000000040)=0x4) [ 1047.065792] kauditd_printk_skb: 155 callbacks suppressed [ 1047.065807] audit: type=1400 audit(1542920022.598:2958): avc: denied { map } for pid=1816 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:42 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0xffffffffa0008000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 1047.288511] audit: type=1400 audit(1542920022.628:2959): avc: denied { map } for pid=1818 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:42 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0x40085618, &(0x7f00000000c0)={0x0, 0x0, @value}) [ 1047.477938] audit: type=1400 audit(1542920022.668:2960): avc: denied { map } for pid=1818 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.601848] audit: type=1400 audit(1542920022.698:2961): avc: denied { map } for pid=1816 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.747649] audit: type=1400 audit(1542920022.698:2962): avc: denied { map } for pid=1816 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.932704] audit: type=1400 audit(1542920022.708:2963): avc: denied { map } for pid=1818 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1048.104168] audit: type=1400 audit(1542920022.708:2964): avc: denied { map } for pid=1818 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1048.272018] audit: type=1400 audit(1542920022.728:2965): avc: denied { map } for pid=1816 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1048.400445] audit: type=1400 audit(1542920022.728:2966): avc: denied { map } for pid=1816 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1048.586654] audit: type=1400 audit(1542920022.798:2967): avc: denied { map } for pid=1822 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:44 executing program 1: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 20:53:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 20:53:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000180)={0xca80}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:53:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)={0x20, 0x2d, 0x80010b, 0x0, 0x0, {0x2}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @u32}]}]}, 0x20}}, 0x0) 20:53:44 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0xffffffffa0008000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) 20:53:44 executing program 0: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:44 executing program 2: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 20:53:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 20:53:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/153) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) 20:53:46 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0xffffffffa0008000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 1051.234032] IPVS: ftp: loaded support on port[0] = 21 [ 1051.806999] IPVS: ftp: loaded support on port[0] = 21 [ 1052.116687] kauditd_printk_skb: 147 callbacks suppressed [ 1052.116703] audit: type=1400 audit(1542920027.648:3115): avc: denied { map } for pid=1891 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.342672] audit: type=1400 audit(1542920027.688:3116): avc: denied { map } for pid=1891 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.479382] audit: type=1400 audit(1542920027.708:3117): avc: denied { map } for pid=1891 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.693433] audit: type=1400 audit(1542920027.738:3118): avc: denied { map } for pid=1891 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.832870] audit: type=1400 audit(1542920027.828:3119): avc: denied { map } for pid=1891 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.952644] audit: type=1400 audit(1542920027.828:3120): avc: denied { map } for pid=1891 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:48 executing program 1: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 20:53:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:53:48 executing program 0: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:48 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0xffffffffa0008000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) 20:53:48 executing program 2: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) [ 1053.164949] audit: type=1400 audit(1542920027.918:3121): avc: denied { map } for pid=1891 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.338118] audit: type=1400 audit(1542920027.918:3122): avc: denied { map } for pid=1891 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.490837] audit: type=1400 audit(1542920027.988:3123): avc: denied { map } for pid=1891 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.702151] audit: type=1400 audit(1542920028.008:3124): avc: denied { map } for pid=1893 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x9b) 20:53:49 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 20:53:49 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x800000093c, 0x4) sendto$unix(r0, &(0x7f0000000080), 0x7272, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0x40000000000012, &(0x7f0000000180)=0xfffffffffffffffd, 0xf8) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xfcdf}], 0x1) 20:53:50 executing program 0: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:50 executing program 2: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:50 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x80) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x6, @dev={[], 0x1c}}) ioctl(r0, 0x8000000000008912, &(0x7f0000000340)="153f6234488dd25d766070") ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) [ 1056.702811] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! [ 1057.170513] kauditd_printk_skb: 142 callbacks suppressed [ 1057.170528] audit: type=1400 audit(1542920032.698:3267): avc: denied { map } for pid=1956 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1057.322912] audit: type=1400 audit(1542920032.748:3268): avc: denied { map } for pid=1958 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1057.468076] audit: type=1400 audit(1542920032.748:3269): avc: denied { map } for pid=1958 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:53 executing program 1: getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000fa6000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f8000, 0x0, 0x2, 0x20, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0xa20a, 0x0, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x0, 0x3, 0x2, 0x3, 0x3f, 0x6, 0x0, 0x0, 0x800004, @perf_bp={&(0x7f0000000340)}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x0, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x0, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r3, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr}}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000380)={r0, 0x49, 0x7fffffff, "1f22585f45fc546e1f48e5ed880e2776847862b57ffd22423239b8bae5a4b830bdb663bbb1feba5065675cad2f0e93c42f1c5ed45fda69cb45d0126bf6759838cc60f59efaef216aecfba6635444028d3d49b31ccd1770f57c9f448cd6f2e47638ca2b21f1beb05160087c81312cb53028681a45e6f8500d66aa9f41acea82a4be736e1b4d314ae3649cdfde976cc9cf03b81fecc557ee8e320e84fe7f1655c750f63e70545cc1a6078583dfd46edea6ec2071463c14d936711645020e72"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fstat(r1, &(0x7f0000001500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000001440)=[{&(0x7f0000001400), 0x0, 0xa31c}], 0x80800, &(0x7f00000004c0)=ANY=[@ANYRESHEX]) 20:53:53 executing program 5: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=@ethtool_gfeatures}) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@ax25, &(0x7f0000000280)=0x80, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000700)={0x2, 0x0, [{}, {0x0, 0x0, 0x8}]}) 20:53:53 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 20:53:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x80) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x6, @dev={[], 0x1c}}) ioctl(r0, 0x8000000000008912, &(0x7f0000000340)="153f6234488dd25d766070") ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) [ 1057.690879] audit: type=1400 audit(1542920032.758:3270): avc: denied { map } for pid=1958 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1057.873252] audit: type=1400 audit(1542920032.758:3271): avc: denied { map } for pid=1958 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:53 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r1, 0x65, 0x10000000006, &(0x7f0000000040)="f0000003", 0x4) [ 1058.124819] audit: type=1400 audit(1542920032.778:3272): avc: denied { map } for pid=1951 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.340168] audit: type=1400 audit(1542920032.798:3273): avc: denied { map } for pid=1951 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) chroot(0x0) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) syncfs(0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r3 = dup2(r0, r0) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) sendfile(0xffffffffffffffff, r2, 0x0, 0x7) inotify_init() write$binfmt_elf32(r3, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xd) poll(&(0x7f0000000040)=[{r3}], 0x1, 0xe0) dup2(r1, r0) [ 1058.575394] audit: type=1400 audit(1542920032.808:3274): avc: denied { map } for pid=1956 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000440)='mqueue\x00', 0x1, &(0x7f0000000480)) faccessat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x7, 0x0) 20:53:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x80) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x6, @dev={[], 0x1c}}) ioctl(r0, 0x8000000000008912, &(0x7f0000000340)="153f6234488dd25d766070") ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) [ 1058.772363] audit: type=1400 audit(1542920032.808:3275): avc: denied { map } for pid=1956 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.912262] audit: type=1400 audit(1542920032.818:3276): avc: denied { map } for pid=1956 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:54 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 20:53:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:53:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) chroot(0x0) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) syncfs(0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r3 = dup2(r0, r0) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) sendfile(0xffffffffffffffff, r2, 0x0, 0x7) inotify_init() write$binfmt_elf32(r3, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xd) poll(&(0x7f0000000040)=[{r3}], 0x1, 0xe0) dup2(r1, r0) 20:53:56 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x80) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x6, @dev={[], 0x1c}}) ioctl(r0, 0x8000000000008912, &(0x7f0000000340)="153f6234488dd25d766070") ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) 20:53:57 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x4, 0x2, 0x0, 0x0, [@remote, @remote]}, 0x28) 20:53:57 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) [ 1062.179368] kauditd_printk_skb: 162 callbacks suppressed [ 1062.179383] audit: type=1400 audit(1542920037.708:3439): avc: denied { map } for pid=2021 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) chroot(0x0) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) syncfs(0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r3 = dup2(r0, r0) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) sendfile(0xffffffffffffffff, r2, 0x0, 0x7) inotify_init() write$binfmt_elf32(r3, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xd) poll(&(0x7f0000000040)=[{r3}], 0x1, 0xe0) dup2(r1, r0) [ 1062.446263] audit: type=1400 audit(1542920037.788:3441): avc: denied { map } for pid=2024 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept(r0, 0x0, &(0x7f0000000080)=0x38f) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003040), 0x40000000000016b, 0x0) [ 1062.664668] audit: type=1400 audit(1542920037.788:3442): avc: denied { map } for pid=2024 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1062.838039] audit: type=1400 audit(1542920037.798:3443): avc: denied { map } for pid=2023 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1062.995563] audit: type=1400 audit(1542920037.798:3444): avc: denied { map } for pid=2023 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.184326] audit: type=1400 audit(1542920037.778:3440): avc: denied { map } for pid=2021 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.336622] audit: type=1400 audit(1542920037.808:3445): avc: denied { map } for pid=2021 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.499541] audit: type=1400 audit(1542920037.828:3446): avc: denied { map } for pid=2019 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.632004] audit: type=1400 audit(1542920037.848:3447): avc: denied { map } for pid=2019 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.771901] audit: type=1400 audit(1542920037.868:3448): avc: denied { map } for pid=2023 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:53:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x57d, 0x337) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0x14}, 0x2000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 20:53:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000080)) 20:53:59 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) fgetxattr(r1, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000001080)=[@iv={0x18}], 0xd4, 0x1}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e23706f7369785f6101005f616363657c73006ffe4cf43a99e065feba35d4b69316d024649569cc3854162b46e848dfe5ff44894ab86622689bdf09f2186acc06aaf1781f309a"], &(0x7f00000004c0)=""/116, 0x74) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) dup2(r1, r4) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r5, 0x1277, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r6, &(0x7f0000000100)=""/186, 0x4a9e280) ioctl$NBD_SET_SOCK(r0, 0xab09, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x12b800, 0x0) mount$9p_xen(&(0x7f0000000040)='wlan0(.vboxnet1*\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000002180)='9p\x00', 0xa00040, &(0x7f00000021c0)={'trans=xen,', {[{@version_u='version=9p2000.u'}, {@access_client='access=client'}, {@version_L='version=9p2000.L'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) 20:53:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) chroot(0x0) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) syncfs(0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r3 = dup2(r0, r0) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) sendfile(0xffffffffffffffff, r2, 0x0, 0x7) inotify_init() write$binfmt_elf32(r3, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xd) poll(&(0x7f0000000040)=[{r3}], 0x1, 0xe0) dup2(r1, r0) 20:53:59 executing program 3: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffc, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/226, 0xe2}], 0x1) [ 1066.302977] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:54:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:54:03 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) fgetxattr(r1, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000001080)=[@iv={0x18}], 0xd4, 0x1}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e23706f7369785f6101005f616363657c73006ffe4cf43a99e065feba35d4b69316d024649569cc3854162b46e848dfe5ff44894ab86622689bdf09f2186acc06aaf1781f309a"], &(0x7f00000004c0)=""/116, 0x74) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) dup2(r1, r4) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r5, 0x1277, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r6, &(0x7f0000000100)=""/186, 0x4a9e280) ioctl$NBD_SET_SOCK(r0, 0xab09, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x12b800, 0x0) mount$9p_xen(&(0x7f0000000040)='wlan0(.vboxnet1*\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000002180)='9p\x00', 0xa00040, &(0x7f00000021c0)={'trans=xen,', {[{@version_u='version=9p2000.u'}, {@access_client='access=client'}, {@version_L='version=9p2000.L'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) 20:54:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r0, &(0x7f0000000240)=""/4096, 0x18) 20:54:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x34, 0x6802) 20:54:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x3ef) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000000), 0x3ffff}, 0x20) 20:54:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$tun(r1, &(0x7f00000002c0)={@val, @void, @eth={@dev, @remote, [], {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "4c91a787365d710eeda0cc7e8bd0fef68f74a5168afd01f9ff89d745e0e8612e7ff75f4636aa731178431d3642f9f5b6919688ab70d5c4d1e0257a1dc7034c96"}}}}}, 0x5a) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r2) [ 1067.718118] kauditd_printk_skb: 185 callbacks suppressed [ 1067.718140] audit: type=1400 audit(1542920043.248:3634): avc: denied { map_create } for pid=2076 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1067.787830] audit: type=1400 audit(1542920043.248:3635): avc: denied { map_read map_write } for pid=2076 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:54:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) [ 1067.935176] audit: type=1400 audit(1542920043.278:3636): avc: denied { map_create } for pid=2076 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:54:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:54:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x1fffffc, @dev}, 0x10) [ 1068.081103] audit: type=1400 audit(1542920043.278:3637): avc: denied { map_read map_write } for pid=2076 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1068.183691] audit: type=1400 audit(1542920043.348:3638): avc: denied { map } for pid=2079 comm="syz-executor2" path="/root/syzkaller-testdir947147148/syzkaller.itSuPD/419/bus" dev="sda1" ino=17255 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1068.359267] audit: type=1400 audit(1542920043.528:3639): avc: denied { map } for pid=2089 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1068.439536] audit: type=1400 audit(1542920043.578:3640): avc: denied { map } for pid=2089 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1068.579896] audit: type=1400 audit(1542920043.578:3641): avc: denied { map } for pid=2089 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1068.778079] audit: type=1400 audit(1542920043.578:3642): avc: denied { map } for pid=2089 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1068.900831] audit: type=1400 audit(1542920043.608:3643): avc: denied { map } for pid=2089 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a), 0xc, &(0x7f0000b4b000)={&(0x7f0000171fc4)=@ipv4_delroute={0x2c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff, 0x0, 0xfe}, [@RTA_PRIORITY={0x8, 0x6, 0x10001}, @RTA_DST={0x8, 0x1, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4006}, 0xc0) 20:54:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:54:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) [ 1069.624207] 9pnet: Could not find request transport: xen 20:54:05 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 20:54:05 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) fgetxattr(r1, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000001080)=[@iv={0x18}], 0xd4, 0x1}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e23706f7369785f6101005f616363657c73006ffe4cf43a99e065feba35d4b69316d024649569cc3854162b46e848dfe5ff44894ab86622689bdf09f2186acc06aaf1781f309a"], &(0x7f00000004c0)=""/116, 0x74) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) dup2(r1, r4) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r5, 0x1277, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r6, &(0x7f0000000100)=""/186, 0x4a9e280) ioctl$NBD_SET_SOCK(r0, 0xab09, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x12b800, 0x0) mount$9p_xen(&(0x7f0000000040)='wlan0(.vboxnet1*\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000002180)='9p\x00', 0xa00040, &(0x7f00000021c0)={'trans=xen,', {[{@version_u='version=9p2000.u'}, {@access_client='access=client'}, {@version_L='version=9p2000.L'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) 20:54:05 executing program 1: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000540)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) 20:54:05 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:54:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:54:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:54:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6gre0\x00', 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x329, 0x0, 0x0, 0x11d) 20:54:06 executing program 1: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000540)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) 20:54:07 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/129) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x20, @mcast1, 0x80000000}, @in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0x101}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="040000a5a0677e4ba61b80ef31bef0c3664e2fbba3b8074b5344e33d171c9b4d9b8aaba86fb4ce0b64bb381839c6bdd3317313a4f2b54ee3758eb5bc220f74658e84b5214374ed0834784d749cd86628c8a546cd16ab8a7561b43035ba98b91046511b62711f579f929757e95c997eba96ff0c0b3039e12030a2596d3d5976d932e09866a299b2f146559e94bb110564fbf5d772c739219c7e4e86b866762b24d86e220ef22c7d00bc610e6f97f81cf605445abd603c50cb33fadb2c378f1a70f2c35deb61f294cdf89af74a7114a50e15b2748de43579be6f465577159521446ff78b3614413d91"], 0x1) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000000100)=0x0) r5 = dup3(r0, r0, 0x80000) io_cancel(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000880)="0fc8014b97977298f6329bb678225a4caab2de8ba5809f2bc659dfec6a04245901fe7753643ef98f30257aa90dff9c1d575dad53b152d395b2c36e2b003655561932c0f2903d81ca3c27abb40459305af93c853c374180c3ead0703a48517e3a7642e8e52adaae3f9cd505735d564270bb71bdc4e410e3956d67faab3f9d7f24ba4294b6cd7b973c04ff5d98489a42dc07abc5e898afa4f73fdaa7e13aa0cd178e3fb19d6939e30b813b959dd68b9c48602d96cebcc6ea3e9b5962673407004cebc32cad7501245108a7", 0xca, 0x2a, 0x0, 0x2, r5}, &(0x7f00000006c0)) r6 = accept$alg(r3, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) connect$can_bcm(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7fff, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) 20:54:07 executing program 0: io_setup(0x3, &(0x7f0000000240)=0x0) r1 = eventfd(0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000180)={0xa0}, 0xa0) 20:54:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, &(0x7f0000000580)=ANY=[]) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000880)=""/207, 0xcf, 0x0, &(0x7f0000000240)={0x2, 0x4e22}, 0x10) sendto$unix(0xffffffffffffffff, &(0x7f00000003c0)="ec5841a385d8cfd975d46deb6628f1a2070bb92814b65292b61048bacc85f32a74e4993ee22c92", 0x27, 0x40881, &(0x7f0000000600)=@abs, 0x6e) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000004c0), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r1, 0x9, 0x2}, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "7c70ee3800d5ab5f2036f872e0ac57cbd592bca0d671633f50a3102066d6e765f5a64731e3fb8d90d250eda2cc33b60a7ff98074cdc3f1dd1a2df26a381d95974e0925d521c6b48c3dee0d430d398884316091aff6adb6153dc3c92549957d3488efc02d6f6fb172524b095c30c1bd35aae04236bdd42694d613eb54c0b65a338c48dc4c8bad70754fc81d9928e4a1b81f9c77075258a0805b4494867247966b24a023311fd91ef3754b98d3acde6f2ef0617f123c22fccb81c11389fdfa2e21c2365aabfc8916e02151d8643ae21cab7fcbec6142186d3bb57546c106484bc4c28a48da2b75dd82aabe99464558e60cd101f6b65856fabee614d271741a68dd550c8772f06a93cf8e5c0de549c3b75a72f8a590bd50b2af5f64009c969ed7596f0192b0f98b1afac0e8c5f4c653f611b4a71776400a9ae3f18e75f856788c97195749042510735880b9bb0ccb23210832a4f1c6f134d68f8e299837c426e0c9a45d5d2c959446cc363f370c67cd01a063c91254d692fe35abee92fabda4f66d93228c979ebe036c5c2e0028ec76562d67d0919ca28258fec0ed60603142b5c57c4cfb1ea1e892d0fd2f33970142b179c415d6bea344fbcc82d133052e848a885160737c69eb02ca9f544831c8e3ffcf40cb7b415d24795fc8aaeb8e76bec262aea5e28fe5d6495c4b5895a612b1cc2122286add66356f3ecd309f970634f1b09da1507964d35575167317f13c7fd9f11af27ceea86e9a5b3494a27ba98ba38dd1fb72ef2c6163664fd8f7c946935cd4833121f505ff277c03d959d9a12f3389e9eb6701a8b29f72c20c6abb7bd8349dd2e120bdd59dca9f1a2a877f1677b59d7920ddf29b9d94f7c6879b78e31cf1b65b60fe349ef9d4976f46609ee34e33f647aafbf64f6323d18598905f2e73af75661397595b8f9c1e9a4e993946820da5378ca5b363560e95edce316e99bac6e6250efcf1cb58fdcf94c7557c2d7f763a688543462d54b64e178c2e64c6ebba356894973051907fd8de8ba908e822168b171c1707efcd9ac827e64313721876e2ff26ac34e88557a4a0dfde08eda81cf0c1465a89b68429e48966044c767563e1121db48c9b619fd7362afd15ec6aa19b28759d7977be4fbcad0cf8dd5dc5362259bd5cb5089a9d18db969afe1192571f5fcc0c4d6be281d23b9c1f9f32873c058adfa1bf57a3718686957edfd6e4b58aa959541127696d59fb2810d042ced227961eb19a424e4cf45bc6243217bb7561b7ee11f8c0b8f39480343a26f2da5fe79d5e213c01ea47155ffa91e7d7ba0bc8ccb018bd69cfe71dd8565a645d678b404a295397e83ae69dbf8505f6947a836b44823a92861124330fccd4bc4a2e20d9047bd919d82c89623caa87eb09bd584d58f42b35ef55fddc06dfb3957f3f507e5ca9b8b98947cc5bb68846755527ddf32ffa444e1c7a5654d4d377e04a9f22e1069804fdcdb251acb6bd6b32d100feb44286991d779d2b3e2b7f5cc5f8eb3ae166a3b6fb9df11e1867989a6f9b2028e4c73b4d418b51f6e870713cadafddb47a48c9a97283da214f02db3326d42438d9a7db580693ad1887f99d86bb5fafd6d07c2647fc80c2c5a1ed9ea3b95be65ca422080ddefca5b49ccd538f6bc67390f892d9e416f7e835f76dd90edc56256348d20560caeea05c0922cab60dbf0b57ddaaed6ded5a336e01485fd571dc12050461271cee347c31ac245bfee9128630dfcc43b6d88b5ba9937a6f6ab70b7d256784ff72297cfcfd0ffacd09b55fb832bf60f04d87c48c74972b9f18fa178ce4880b025d1c1097ddb929e8f7e02f1c0e03012bec0fa61a49eb1c2a50a45fc0d98b6649de325184006938e421321e8b366649d9b6ebadf77509c9d48844e80f7752fd7daaa5c938b946feaaac0d871203270a747035c7e2f697c84e792a55cbce76c0a25360f7acbeaab60627aa9c37064af75b67f46732844eb2f6b37226004afe451a9fbfbbcf7e72ade67b017e9209b5627fbe16789abd90326751a1fd1d93efc59f2650f979ba71938d784064922bee2874c4b76d5f26e39ea0a98cf175950137feff9456c88c6a295830183fae3a9c2312c25f3d81708d73488d15a587e7e7cdde3b77917eef29c8b5965c916a65c3c5a53b7313c3115d0a8bb4e16f6b80ff6f78adb756aba94ced86047562a2cd2fb25e9a4656f6359c3f2fde8b5ab38852853cbd7221cb4d59b7f0e79bd37f9ade073f62b75edbe63c13c0d02bf076d88f5b750ea640aad47ce97d6a0783398dd3fbb63734ed969470cf45200235650532224fc28caf1e36ca6b402ec4c978add40fc59f2113485875682139f8aa9aeb48d09178de919370b0cd0ebcab5e60e1b0a2fc153db0dae8e50b48561622a677d0f1afc149676f832e016e14007fb298dcb96f11a92a1ac8bd4cc7b34d659d6cd2c9817b586585e72080255b083bc84512277ffb7f561c6a7a08cd128bfe9b525da531f0bf04f11d3de102b3538835807ac0b2f4325fc6765d02d692ec82f5b338c8257029136fcd3427c09874ecc7492becdd6608eac4adf1abc3f7e08868a72e57ce4dcfc288a25af73d19f1118a9254963c1548cdca5fc7c921a7f218f8e71edd7969dfb35beae1091d7530e32236397fa9fcd232b441ff1b0177829468c198d659d247ccca4fbd58c625501e4368075d0e5e69a6f90952f5bbe48e85a303131dedf7f1a513b291598a545784e1013521877c25d6069d3a855652a4bad5b2df2e4da2de756a20e790b756dd2925ce824561e5892b5e064c7c7b996acc4e29597e0cd00956e9c57ec374714f846be7632d3075e38bead499163498810886c78a2cc73fb64fd48e186083ce911e0751b4dc63476859c2824fa532a4b1711c244619e702eeab19380aeb7b17f67fade3dcad8ddddd893a526cd5d04d8ae982c88029ec71bdd0772fd74adbdb378fc204ca411a2d8a50331516a28552be78f9725f32d1b3a6c7bdf3277c5f7e385c7ebbacc419ec7ca3c5b8f46dbefee59b6422a6b22d60527edc012f852077d925619874f7709f283e01678fed36528003a696ee431a817f34f453c143dc56b70e1f810a5380a555cc8c4fc6522ab544ce5d715caa302ebdd0aa8286b7ef5dd6dd48a8ad9566818f7509daf02db0b98b432f57f1d107ee95a86228728cab4062e27922381e1e2ee351af5e2ea0fd6d1cea70b3b8f4a50f0776fc9aa2a7d2dff6e1ea3769864104f09137b99960b69af13895d842649eacaed8ddf183beba3323640af8deb52b902c0974d685d19fc87c93eb80ad5d28e54363705ad39231d989522e94f000256bc8d93af138a45d67dad3e21fa9fb31d9327c6e71f61956d9daf4f97333112704136d3d1bf6fe0e4c002e10b684d2344300ec70fae0b50532ebace58f0e8318354a172cceacf27d01ff41cc8fef42443f62b0e15b5fcc0728630b96fb2c2b59634f4993bb1ce2eace6fb0f53e5f84bc5f58b1b66d59e3c75a98670496f105a703607211aa9e882e72f13e9fe07f0767ad4e5ac5c732b65301d8ceab36b5ff2f71958fb1b51d2e703ac506e68d4026160fd3f60440b8b8f554f1feeba5d53f71cbe60d143620f8fa779acb94c965b729207a5ab11f4a51b694c31606171da44a28d80cde296dff5724ff718d6377eb8534e616cff39af943ee4ce87b4fadded30c702d370a71072ab3e20f19b8c1b73fdbbb9c675352bb73ee85e22597fc0c439a33f5febe1629bd084af7193f8d1a1415b02ca54706711505cbae11ec6411b012cc3a3eddcfb002901b6e7565b9fbf4d605c147031888ceb590c14697d00970ce9095c6f7fee41ec6a15d7ef52dfedfff2a0d3dbb387b61232aee6ca202787038021e6aabda18e2adf6fd89aa491e65f9813d73412fbfff089752d713d7efa690ec4fc254b56908d3057f65997acf81aea589e272f8fa852849e488f1e0c0cb6cdb5f46ca92e36d39224e704850056d2e9b91909aed0f55d054e274415ecc39b8958335a14cfb0a42d7f26ef8e82592dfd03b3550b5193fba077994c682951968869574fd94976760d9bd9b334353eeda836cc8dab244e72095cc46833f02bb2f6df35601b3085664261abb67fc9ab9f27210e6827cd15ce16c55f0f7f5b8ab401f24032b19a53a9299b62ebf4a8cf7f4753d95126f008a8ce349036666de66bcaf40b27fa875efa98873e1ef9302e2a24bfe07bd1054bdf9ba9ad1b1075402f26d682833b947c762513ba5f07537bb712473184a60e04ace5adb8d982d6153b011ae0b2034adc0ff4a64e2c6561c2e0840cdab2120bc916cde9b7a92c4d332d0f83945fe55e3c8f4d93f22e7759c20241d92cca0ae5a3d06a127e5614df708cea1ad3b2f231c81460ff4c3f349c67a87135a4b67589ffce311832923f71796276e81f0537e265404c0ee06d5ed98a5ec5f8ad62db589eb585fc4627173b51fd4e897a3e8d2acbb82ec2996ac3a6823368a1e12a0536a9d1a7b2d31d80c46c292ff51395481d4f65c53fab867e27bec9156ee189d245d94877a1405dc9e1e996822ad47071a9ab36c9bfd02c41ea5ba21591793053b1b64758bae0addfcd69d169849bc1ee6ce5c08f0d3da5ecc1b6ab31e13af2fa5ce4d921163270901264a88ac6350e8fb6371663dd04146932238597258b123a8036250c190fbb3cfc6ebbf9e06c4a9053e8332c95c91a890a3d35ddd35f47e7ab606f3e345e12560e6d52243883da7b8910834042ad12e7fb3f08a0b14ef6aee22251999e6079be2ef5666d7d5ae00d161720262761da3f378c63cb151f4e94d034e9de949dfe796b905804ca555691023c30ea7cf0cb276e1e3ba65793291f8287d1064606bf5787421b9b9bfc05e9c5eac750de92519fe9e2592cd34a2ef6ec18efed5e7c13bfcfce47327cbecac358bbe6d44164849308cf91cd5ea87fa4b02ba4939e28141c7dad42714b019470d91808a8f46150677b6c90f267ecb39ef42afc95de0cbd016775c89d8213ec9d4e061e6493f237296f91abfc64176c0e885ef54af4136a724fadfe89a25d7599998acebc4a27f8fb5b26936bda5c3d5fec3373dcd9a0e99fc939641c50669adc54119582e8835575d1c57fa955cd29d870360620f91c3ff90d264013816352317ae226f7d7bad5db711f8973382f6cebd63cd519ddd08e1772649be75f64f4acc15f828dc0b305584b6dd2213194603c44e2964358d305aa97fb08568a0a955ad7a6f8d042754b4bbf2fb3414052719fd9841bef8360d1d3195c69414be882115c2c64fecdcbdaed3a2e943fdfef9a13520e41d32a787bcfe4f61e2b378d35aa70784a772cf8ebcaaeb105e4627516db2ababfcb8c11f224c3a48c86160d34d0ee59f02c31648ae4b0309b378f0bf63266967dcfb4f1cc1902f613c6d0d48915a9cf28a52b106544cde1b38ff2e2a1275fd0d3899ce7f7c6653c9017f7ac4aaa35bcb2811a8f9dbb56746b45475350e7c13d42abb5692377da7a4045ee644ce00f8699e3251d75621c82cd659ea3add277affe3ff792f7d24a3d0979ef82cfc0d409697ae2e8598854a8327f46974c901d309dc6dbe31913c59d821aa50c0fe95cc822e8f07bbb00e9a09bc9a570b9778d29308740bc336a41258d209c206f87a709aa43415da0096f7d177e509a7d625645fb098ccc45367d82235e952670ac5f82f8ced3f59fd9ee20ac75be609cc832417e807ddc40630cba4c91e0785edcb5f20b9e6dedb1ec172cd16fc034f410e9ce375ea855144aa3076317f649cf4efe4d7abf244984c4e", 0xff54}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r1, &(0x7f0000000380)=@known='trusted.overlay.nlink\x00', &(0x7f0000000700)=""/215, 0xd7) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000019c0)={0x0, @in={{0x2, 0x4e24, @rand_addr=0xffffffffffffffff}}, [0x5, 0x1f, 0xff7e, 0xfb2, 0x2, 0x6, 0x0, 0x100, 0x3ff, 0xfffffffffffffbff, 0x7fff, 0x7]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r2, 0x32}, &(0x7f00000001c0)=0x8) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000680)=0x1, 0x4) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000480)=0x1) 20:54:07 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) fgetxattr(r1, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000001080)=[@iv={0x18}], 0xd4, 0x1}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e23706f7369785f6101005f616363657c73006ffe4cf43a99e065feba35d4b69316d024649569cc3854162b46e848dfe5ff44894ab86622689bdf09f2186acc06aaf1781f309a"], &(0x7f00000004c0)=""/116, 0x74) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) dup2(r1, r4) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r5, 0x1277, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r6, &(0x7f0000000100)=""/186, 0x4a9e280) ioctl$NBD_SET_SOCK(r0, 0xab09, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x12b800, 0x0) mount$9p_xen(&(0x7f0000000040)='wlan0(.vboxnet1*\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000002180)='9p\x00', 0xa00040, &(0x7f00000021c0)={'trans=xen,', {[{@version_u='version=9p2000.u'}, {@access_client='access=client'}, {@version_L='version=9p2000.L'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) 20:54:08 executing program 1: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000540)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) 20:54:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000180)=@ethtool_ringparam={0x10, 0x0, 0x1}}) [ 1072.729023] kauditd_printk_skb: 119 callbacks suppressed [ 1072.729039] audit: type=1400 audit(1542920048.258:3763): avc: denied { map } for pid=2155 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) [ 1072.899633] audit: type=1400 audit(1542920048.328:3764): avc: denied { map } for pid=2155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1073.035039] audit: type=1400 audit(1542920048.338:3765): avc: denied { map } for pid=2155 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1073.162229] audit: type=1400 audit(1542920048.358:3766): avc: denied { map } for pid=2155 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) lstat(&(0x7f0000000240)='./control\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)={0x1, 0x89f}) chown(&(0x7f0000000080)='./control\x00', 0x0, r1) open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0xfffffffffffffffc) [ 1073.337358] audit: type=1400 audit(1542920048.358:3767): avc: denied { map } for pid=2155 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:09 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='syzkaller1\x00', 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r1, r0, &(0x7f00000000c0), 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000a80)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f", 0x3) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000640)="2ad4d425e960468d16ca8e57", 0xc) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040)=0x7d000000, 0x10000000000443) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r3, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) [ 1073.494337] audit: type=1400 audit(1542920048.448:3768): avc: denied { map } for pid=2164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:09 executing program 1: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000540)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) [ 1073.660286] audit: type=1400 audit(1542920048.448:3769): avc: denied { map } for pid=2164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1073.803332] audit: type=1400 audit(1542920048.498:3770): avc: denied { map } for pid=2164 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1073.913689] audit: type=1400 audit(1542920048.498:3771): avc: denied { map } for pid=2164 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}}, 0x1c}}, 0x0) [ 1074.103878] audit: type=1400 audit(1542920048.538:3773): avc: denied { map } for pid=2164 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:09 executing program 0: socketpair$unix(0x1, 0x40000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000040)=0x2dd) close(r2) close(r1) 20:54:10 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x1555555555555913, 0x0, 0xfffffffffffffffd, 0x8) [ 1074.960418] 9pnet: Could not find request transport: xen 20:54:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0, 0x8000000, 0x0, 0x0, 0x710000}) 20:54:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_buf(r0, 0x29, 0x43, &(0x7f0000000000), 0x0) 20:54:10 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000140)={"69666230020000000200", @ifru_map}) 20:54:11 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f00000002c0)=0x1) r0 = socket(0xa, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000a40)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x34000}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00'}) setpriority(0x0, 0x0, 0x0) request_key(&(0x7f0000000480)='cifs.spnego\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000580)='trusted.overlay.impure\x00', 0xfffffffffffffffd) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000180)=0x9, 0x4) 20:54:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x138, [0x20000340, 0x0, 0x0, 0x20000370, 0x200003a0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ifb0\x00', 'dummy0\x00', 'syzkaller0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}}]}]}, 0x1b0) 20:54:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='ns\x00') getdents(r1, &(0x7f0000000140)=""/174, 0xae) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) 20:54:11 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0, 0x8000000, 0x0, 0x0, 0x710000}) 20:54:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setgroups(0x0, 0x0) 20:54:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_buf(r0, 0x29, 0x43, &(0x7f0000000000), 0x0) 20:54:11 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) unshare(0x40600) signalfd4(r0, &(0x7f0000000000), 0x8, 0x0) 20:54:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb9, &(0x7f00000000c0)) 20:54:12 executing program 4: ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x210087f2, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fscontext=syste']) 20:54:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setgroups(0x0, 0x0) 20:54:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_buf(r0, 0x29, 0x43, &(0x7f0000000000), 0x0) 20:54:12 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0, 0x8000000, 0x0, 0x0, 0x710000}) 20:54:12 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc08c5102, &(0x7f0000a07fff)) 20:54:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000100)=@nl=@unspec, 0x80) [ 1077.604210] SELinux: security_context_str_to_sid(syste) failed for (dev bpf, type bpf) errno=-22 [ 1077.723107] SELinux: security_context_str_to_sid(syste) failed for (dev bpf, type bpf) errno=-22 [ 1077.737677] kauditd_printk_skb: 153 callbacks suppressed [ 1077.737693] audit: type=1400 audit(1542920053.268:3926): avc: denied { map } for pid=2251 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:13 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl(r0, 0x40084146, 0x0) 20:54:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setgroups(0x0, 0x0) 20:54:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0, 0x8000000, 0x0, 0x0, 0x710000}) 20:54:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_buf(r0, 0x29, 0x43, &(0x7f0000000000), 0x0) 20:54:13 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc08c5102, &(0x7f0000a07fff)) 20:54:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000003980)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000e00)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") [ 1078.505870] audit: type=1400 audit(1542920054.038:3927): avc: denied { map } for pid=2270 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1078.591345] audit: type=1400 audit(1542920054.068:3928): avc: denied { map } for pid=2270 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setgroups(0x0, 0x0) [ 1078.752965] audit: type=1400 audit(1542920054.088:3929): avc: denied { map } for pid=2270 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:14 executing program 1: r0 = memfd_create(&(0x7f0000001380)="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", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x40d5) [ 1078.861375] audit: type=1400 audit(1542920054.098:3930): avc: denied { map } for pid=2270 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585605, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000001c0)) geteuid() [ 1079.021072] audit: type=1400 audit(1542920054.198:3931): avc: denied { map } for pid=2270 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:14 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc08c5102, &(0x7f0000a07fff)) [ 1079.182737] audit: type=1400 audit(1542920054.248:3932): avc: denied { map } for pid=2270 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x200000002, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x3, 0x3}}, 0x2e) [ 1079.353588] audit: type=1400 audit(1542920054.268:3933): avc: denied { map } for pid=2270 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1079.483789] audit: type=1400 audit(1542920054.318:3934): avc: denied { map } for pid=2275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1079.603688] audit: type=1400 audit(1542920054.318:3935): avc: denied { map } for pid=2275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x2, 0x7}]}}}]}, 0x3c}}, 0x0) 20:54:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xbe68, 0x400000) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000156, 0x0) 20:54:15 executing program 1: creat(&(0x7f0000000000)="e91f7189591e9233614b00", 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:54:15 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc08c5102, &(0x7f0000a07fff)) 20:54:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585605, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000001c0)) geteuid() 20:54:16 executing program 0: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bind(r0, &(0x7f0000670000)=@generic={0x1e, "02fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 1080.636126] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode balance-rr(0) 20:54:16 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x30041) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000001d40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3abe483a608e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de34de39ed145571230ab02c89bc39f65ba52646"], 0xc1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000240)=""/126) pause() ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) semop(0x0, &(0x7f0000000080)=[{0x7}, {0x2, 0x1e, 0x1800}, {0x7, 0x4}], 0x3) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 20:54:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000240)={0x0, 0x2000000001, 0x0, 0x0}) 20:54:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8de, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b02e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f00", 0x2761, 0x0) 20:54:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 20:54:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585605, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000001c0)) geteuid() 20:54:17 executing program 0: socket$pptp(0x18, 0x1, 0x2) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000280)) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0xfffffffffffffe95) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast2, @loopback, @remote, 0x5, 0x4, 0xacf, 0x0, 0x8001, 0x68, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) semget(0x3, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001b000)={@empty, @remote, @loopback}, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f00000002c0)=""/91, 0x5b}], 0x100000000000005e, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r3, &(0x7f0000000140), 0x391, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000040), 0x0) eventfd(0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000002680)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8002010000400200) ioctl$VHOST_GET_FEATURES(r0, 0x80044dff, &(0x7f0000000100)) 20:54:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8de, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b02e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f00", 0x2761, 0x0) 20:54:17 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc1004111, &(0x7f0000000000)) 20:54:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) getsockopt$inet_mtu(r2, 0x0, 0x29, &(0x7f0000000040), &(0x7f0000000000)=0x4) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891a, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x0, @broadcast}}) close(r2) dup3(r1, 0xffffffffffffffff, 0x0) 20:54:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585605, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000001c0)) geteuid() [ 1082.750540] kauditd_printk_skb: 137 callbacks suppressed [ 1082.750555] audit: type=1400 audit(1542920058.278:4073): avc: denied { map } for pid=2351 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8de, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b02e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f00", 0x2761, 0x0) 20:54:18 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc1004111, &(0x7f0000000000)) 20:54:18 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x1, &(0x7f0000cbc000)=""/244, &(0x7f0000000040)=0xf4) [ 1082.967834] audit: type=1400 audit(1542920058.308:4074): avc: denied { map } for pid=2352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.173368] audit: type=1400 audit(1542920058.328:4075): avc: denied { map } for pid=2352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.203250] audit: type=1400 audit(1542920058.338:4076): avc: denied { map } for pid=2351 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:18 executing program 0: socket$pptp(0x18, 0x1, 0x2) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000280)) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0xfffffffffffffe95) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast2, @loopback, @remote, 0x5, 0x4, 0xacf, 0x0, 0x8001, 0x68, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) semget(0x3, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001b000)={@empty, @remote, @loopback}, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f00000002c0)=""/91, 0x5b}], 0x100000000000005e, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r3, &(0x7f0000000140), 0x391, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000040), 0x0) eventfd(0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000002680)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8002010000400200) ioctl$VHOST_GET_FEATURES(r0, 0x80044dff, &(0x7f0000000100)) [ 1083.472883] audit: type=1400 audit(1542920058.348:4077): avc: denied { map } for pid=2359 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.575359] audit: type=1400 audit(1542920058.348:4078): avc: denied { map } for pid=2359 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.725228] audit: type=1400 audit(1542920058.378:4079): avc: denied { map } for pid=2352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.859473] audit: type=1400 audit(1542920058.378:4080): avc: denied { map } for pid=2352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1083.982213] audit: type=1400 audit(1542920058.398:4081): avc: denied { map } for pid=2359 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:19 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc1004111, &(0x7f0000000000)) 20:54:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8de, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b02e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f00", 0x2761, 0x0) 20:54:19 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000580)='/dev/input/event#\x00', 0x1f, 0x4001fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={{0x77359400}}) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d, @ipv4={[], [], @broadcast}}, {0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0xc}}}}, 0x48) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x101000, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000005c0)) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000080)='.\x00', 0xfe) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000480)=ANY=[], 0x2e7) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000600)={0xc8, r8, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc58f}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x300000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffcd2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x400c000}, 0x85) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) r9 = fcntl$dupfd(r7, 0x406, r7) ioctl$EVIOCGPROP(r9, 0x80404509, &(0x7f0000000140)=""/90) ioctl$EVIOCGABS3F(r9, 0x8018457f, &(0x7f00000000c0)=""/111) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) connect(r0, &(0x7f0000000000)=@xdp={0x2c, 0x7, r10, 0x3ff}, 0x80) [ 1084.158852] audit: type=1400 audit(1542920058.398:4082): avc: denied { map } for pid=2351 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:19 executing program 1: unshare(0x24020400) unshare(0x24020400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f2f6e657400000000000000072f6578706972655f6e6f646573b14a8874745f63", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) syz_genetlink_get_family_id$fou(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 20:54:20 executing program 0: socket$pptp(0x18, 0x1, 0x2) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000280)) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0xfffffffffffffe95) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast2, @loopback, @remote, 0x5, 0x4, 0xacf, 0x0, 0x8001, 0x68, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) semget(0x3, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001b000)={@empty, @remote, @loopback}, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f00000002c0)=""/91, 0x5b}], 0x100000000000005e, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r3, &(0x7f0000000140), 0x391, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000040), 0x0) eventfd(0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000002680)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8002010000400200) ioctl$VHOST_GET_FEATURES(r0, 0x80044dff, &(0x7f0000000100)) 20:54:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x1203}, 0x28) 20:54:20 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc1004111, &(0x7f0000000000)) 20:54:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_sco(r2, &(0x7f0000000200)={0x1f, {0x0, 0xfffffffffffffff7, 0x0, 0x0, 0xced5, 0x7fffffff}}, 0x8) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) 20:54:21 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x7, 0x10000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0xfd1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000340)=0x800000000000002, 0xffffffffffffffa7) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f00000004c0)=0x4, 0x97) sendto$inet(r2, &(0x7f0000000a00)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9", 0x241, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000480)="2173656c69f24d6e757873656c696e757800", 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) mq_timedreceive(r3, &(0x7f0000000540)=""/24, 0x18, 0xc0000001, 0x0) getcwd(&(0x7f0000000180)=""/118, 0x4a) unshare(0x4010000) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @rand_addr=0x2}, 0xfffffffffffffd6b) 20:54:21 executing program 0: socket$pptp(0x18, 0x1, 0x2) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000280)) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0xfffffffffffffe95) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast2, @loopback, @remote, 0x5, 0x4, 0xacf, 0x0, 0x8001, 0x68, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) semget(0x3, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001b000)={@empty, @remote, @loopback}, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f00000002c0)=""/91, 0x5b}], 0x100000000000005e, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r3, &(0x7f0000000140), 0x391, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000040), 0x0) eventfd(0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000002680)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8002010000400200) ioctl$VHOST_GET_FEATURES(r0, 0x80044dff, &(0x7f0000000100)) 20:54:21 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind(r0, &(0x7f0000000380)=@hci, 0x80) r1 = dup(r0) getsockname$packet(r1, 0x0, &(0x7f0000000080)) 20:54:21 executing program 1: unshare(0x24020400) unshare(0x24020400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f2f6e657400000000000000072f6578706972655f6e6f646573b14a8874745f63", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) syz_genetlink_get_family_id$fou(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 20:54:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x1203}, 0x28) 20:54:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) msgget$private(0x0, 0x4) socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, {0xa, 0x4e21, 0x2, @mcast1, 0xff}, 0x0, [0x10000, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x5c) creat(&(0x7f0000000200)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xc, 0x22c) move_pages(0x0, 0x2, &(0x7f0000000400)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil], &(0x7f0000000440)=[0x0, 0x0, 0x1f, 0xffffffffffffff5f, 0x9], &(0x7f0000000480)=[0x0], 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000540)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='f2fs\x00', 0x0, &(0x7f0000000640)='/dev/qat_adf_c,l\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f00000006c0)={0x0, 0x1, 'client1\x00', 0xffffffff80000000, "9dd7324349cdc07e", "8fd46cab68a7fabb5017c1afc486abebd004425e2fc25b7b229e018b2affe8b5", 0x2, 0x7fffffff}) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[@ANYRESDEC=0x0], 0x1bd) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e21}}, 0x6, 0x0, 0x0, 0x3, 0x4}, &(0x7f0000000140)=0x98) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000600)='TRUE', 0x4, 0x3) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r2, &(0x7f0000000840)="a6ec859e7635c2d5b2f7fa0f8113b4edfd50a937291ce770f375bcc0afcfe44e42ac0224eb9178267fb2026016fb9bd1c334af7d18504efafe7d9f073e725b99b714a93bb9d3022da1a14269cdd39f20b3e6517e37ee6347d5c98177cdaccd4282860f311d4b8aa78831f2b62a0c127921cd62c17dd07a9dc0e9efa9df97c309835fefcb2f6e", &(0x7f0000000900)=""/255}, 0x18) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f00000007c0)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB=',']) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4c0a00) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0x29b) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000200)=@ethtool_coalesce={0xf, 0x7f, 0x4, 0x1, 0x6, 0xbd, 0x7, 0x93, 0x800000008000000, 0x0, 0x3, 0x0, 0x9, 0x6, 0x0, 0x5, 0x3, 0x3254, 0x3c, 0x6, 0x0, 0x5, 0x401}}) 20:54:22 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x0, 0x80000001}) 20:54:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x1203}, 0x28) 20:54:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x44, r1, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}]}, 0x44}}, 0x0) 20:54:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 20:54:23 executing program 1: unshare(0x24020400) unshare(0x24020400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f2f6e657400000000000000072f6578706972655f6e6f646573b14a8874745f63", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) syz_genetlink_get_family_id$fou(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 1087.981072] kauditd_printk_skb: 213 callbacks suppressed [ 1087.981086] audit: type=1400 audit(1542920063.508:4296): avc: denied { map } for pid=2456 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1088.117530] audit: type=1400 audit(1542920063.568:4297): avc: denied { create } for pid=2459 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1088.146628] IPVS: Unknown mcast interface: syzkaller1 20:54:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000380)=""/169, 0xfffa) utimes(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={{0x0, 0x7530}}) getdents64(r1, &(0x7f0000000100)=""/149, 0xffffffffffffffe9) [ 1088.332796] audit: type=1400 audit(1542920063.578:4298): avc: denied { map } for pid=2456 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:23 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc008551c, 0x0) 20:54:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x100000004, 0x4, 0x0, 0xffffffffffffff9c}, 0x2c) unshare(0x20400) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x10) [ 1088.475102] audit: type=1400 audit(1542920063.578:4299): avc: denied { map } for pid=2456 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1088.556885] audit: type=1400 audit(1542920063.578:4300): avc: denied { map } for pid=2456 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x1203}, 0x28) [ 1088.803696] audit: type=1400 audit(1542920063.598:4301): avc: denied { create } for pid=2459 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1088.829263] audit: type=1400 audit(1542920063.598:4302): avc: denied { write } for pid=2459 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1088.892321] audit: type=1400 audit(1542920063.618:4303): avc: denied { map } for pid=2456 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1089.072926] audit: type=1400 audit(1542920063.628:4304): avc: denied { read } for pid=2459 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1089.273111] audit: type=1400 audit(1542920063.678:4305): avc: denied { write } for pid=2459 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:54:25 executing program 1: unshare(0x24020400) unshare(0x24020400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f2f6e657400000000000000072f6578706972655f6e6f646573b14a8874745f63", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) syz_genetlink_get_family_id$fou(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 20:54:25 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 20:54:25 executing program 2: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40), 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0x6a948161975e2736, 0x800) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 20:54:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f0000000040)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0xffffffffa0008000, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000000)={0x0, 0xfffffffffffffffc, [0x2, 0xfffffffffffffffc]}) 20:54:25 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x4, 0x4) 20:54:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 20:54:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 20:54:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 20:54:26 executing program 3: r0 = socket$inet6(0xa, 0x40000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0xff55, 0x0, &(0x7f0000000140)={0xa, 0x4e21}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 20:54:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000280)=""/4096) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x81) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:54:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0xf59}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f00000001c0), &(0x7f0000000040)}, 0x20) [ 1093.001228] kauditd_printk_skb: 158 callbacks suppressed [ 1093.001243] audit: type=1400 audit(1542920068.528:4464): avc: denied { map } for pid=2536 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1093.215149] audit: type=1400 audit(1542920068.598:4465): avc: denied { map } for pid=2536 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1093.594112] REISERFS (device loop2): found reiserfs format "3.6" with standard journal 20:54:29 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[], 0x9e) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001740)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000015c0)="e2667195e5b4a5cf8f145b4c5c572d0993", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1093.786922] REISERFS warning (device loop2): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 1093.838448] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 1093.881842] audit: type=1400 audit(1542920068.608:4466): avc: denied { map_create } for pid=2540 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:54:29 executing program 3: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f0000000140)) exit(0x0) creat(&(0x7f0000000180)='./file0/bus\x00', 0x0) 20:54:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, 0x28, 0xf01, 0x0, 0x0, {0xe}}, 0x14}}, 0x0) [ 1094.086874] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 1094.146160] REISERFS warning (device loop2): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 1094.185709] audit: type=1400 audit(1542920068.658:4467): avc: denied { map_read map_write } for pid=2540 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1094.392779] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 1094.483118] REISERFS warning (device loop2): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 1094.512707] audit: type=1400 audit(1542920068.678:4468): avc: denied { map } for pid=2536 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1094.650865] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 1094.663623] audit: type=1400 audit(1542920068.678:4469): avc: denied { map } for pid=2536 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1094.687573] audit: type=1400 audit(1542920068.728:4470): avc: denied { map_create } for pid=2540 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1094.710427] audit: type=1400 audit(1542920069.008:4471): avc: denied { map_read map_write } for pid=2540 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1094.733902] audit: type=1400 audit(1542920069.098:4472): avc: denied { map } for pid=2536 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1094.835801] audit: type=1400 audit(1542920069.098:4473): avc: denied { map } for pid=2536 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 20:54:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) recvmmsg(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000480)=@ll, 0x80, &(0x7f0000000280)=[{&(0x7f0000000500)=""/244, 0xf4}], 0x1}}], 0x1, 0x0, &(0x7f0000001d80)) sendto$inet6(r0, &(0x7f00000002c0)="050100000500000000000000ffa2ada33f93820fd903378c39160aaacb57a80000067d0004000033e3c2e772a249563dd86e4a58611537a0bec2d5e9f6aa000b7a0e4263262e625ef7402810fadc5712f29508c008e265756fe5eb8f5972eaecfffc2bd906aba5568a122a38d18df6f3de816cbce99032140d83ee743bdd", 0x7e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000001, @dev}, 0x1c) 20:54:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 20:54:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 20:54:31 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) 20:54:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='wlan1@@securityvboxnet1vboxnet1cpusetppp0(\x00', 0x4) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty, 0x6}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x100000000000, 0x0, 0x0, 0x80000}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 20:54:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0xbf7b101fd8de68d3, &(0x7f0000000180)) [ 1098.024208] kauditd_printk_skb: 79 callbacks suppressed [ 1098.024223] audit: type=1400 audit(1542920073.558:4553): avc: denied { map } for pid=2590 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.337387] audit: type=1400 audit(1542920073.558:4554): avc: denied { map } for pid=2590 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) accept4(r0, 0x0, &(0x7f0000000200)=0x260, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x100000000000, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) sendto$inet(r4, &(0x7f0000000680)="e7d63f41b2884e13f7f2b327039d8576", 0x10, 0x890, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10) write$binfmt_aout(r4, &(0x7f0000000280)=ANY=[@ANYRES64=0x0], 0x8) write$P9_RMKDIR(r4, &(0x7f0000000380)={0x14, 0x49, 0x0, {0x8, 0xffffffffffffffff, 0x8}}, 0x14) creat(&(0x7f0000000240)='./bus\x00', 0x10) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000200)) keyctl$get_persistent(0x16, 0x0, 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000580)='ramfs\x00', 0x0, &(0x7f0000000000)) stat(&(0x7f00000005c0)='./file0/../file0\x00', &(0x7f0000000700)) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/18, 0x12) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000540)=0x0) sched_setaffinity(r5, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000300)={@local, 0x0}, &(0x7f0000000340)=0x14) recvfrom$packet(r2, &(0x7f0000000440)=""/239, 0xef, 0x2, &(0x7f00000003c0)={0x11, 0x7, r6, 0x1, 0x7, 0x6, @remote}, 0x14) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a00)={&(0x7f00000009c0)='./file0\x00'}, 0x10) [ 1098.467628] audit: type=1400 audit(1542920073.558:4555): avc: denied { map } for pid=2590 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.499531] REISERFS (device loop2): found reiserfs format "3.6" with standard journal [ 1098.508140] REISERFS warning (device loop2): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 1098.534121] audit: type=1400 audit(1542920073.558:4556): avc: denied { map } for pid=2590 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.661242] REISERFS warning (device loop2): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 1098.706068] audit: type=1400 audit(1542920073.698:4557): avc: denied { map } for pid=2588 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1098.823091] REISERFS warning (device loop2): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:54:34 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000001200)=""/145, &(0x7f0000000040)=0x91) [ 1098.900400] audit: type=1400 audit(1542920073.698:4558): avc: denied { map } for pid=2588 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:34 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) 20:54:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) [ 1099.033166] audit: type=1400 audit(1542920073.728:4559): avc: denied { map } for pid=2590 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) [ 1099.178437] audit: type=1400 audit(1542920073.818:4560): avc: denied { map } for pid=2588 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40c2, 0x192) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000602000/0x3000)=nil, 0x3000}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000015c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001600)=[{&(0x7f0000010000)="00084000998681ff130200001200100000030100000200000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) [ 1099.371387] audit: type=1400 audit(1542920073.828:4561): avc: denied { map } for pid=2588 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1099.504607] audit: type=1400 audit(1542920073.828:4562): avc: denied { map } for pid=2588 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1099.773880] overlayfs: failed to resolve './file0': -2 20:54:35 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) 20:54:35 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) [ 1102.223058] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 1102.252824] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device 20:54:37 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) [ 1102.468409] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 1102.514800] REISERFS (device loop2): found reiserfs format "3.6" with standard journal [ 1102.594921] REISERFS warning (device loop2): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device 20:54:38 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) 20:54:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 1102.854372] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 1102.927608] REISERFS warning (device loop2): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 1102.962716] REISERFS warning (device loop2): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 1103.105502] kauditd_printk_skb: 128 callbacks suppressed [ 1103.105526] audit: type=1400 audit(1542920078.638:4692): avc: denied { map } for pid=2660 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.162653] audit: type=1400 audit(1542920078.638:4693): avc: denied { map } for pid=2660 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.273482] audit: type=1400 audit(1542920078.638:4694): avc: denied { map } for pid=2660 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.362721] audit: type=1400 audit(1542920078.638:4695): avc: denied { map } for pid=2660 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x5) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) getgid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f68000)={@remote, 0x0, 0x0, 0x0, 0x1}, 0x20) 20:54:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x0, 0x2, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x78}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 20:54:39 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) [ 1103.606689] audit: type=1400 audit(1542920078.648:4696): avc: denied { map } for pid=2643 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.705373] audit: type=1400 audit(1542920078.558:4691): avc: denied { map } for pid=2659 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.834327] audit: type=1400 audit(1542920078.688:4697): avc: denied { map } for pid=2659 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.995106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1104.108285] audit: type=1400 audit(1542920078.688:4698): avc: denied { map } for pid=2659 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1104.327077] audit: type=1400 audit(1542920078.758:4699): avc: denied { map } for pid=2660 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:40 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) [ 1104.706860] audit: type=1400 audit(1542920078.788:4700): avc: denied { map } for pid=2660 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x0, 0x2, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x78}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 20:54:40 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) 20:54:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:54:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:54:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x0, 0x2, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x78}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 20:54:42 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) 20:54:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:54:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x5) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) getgid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f68000)={@remote, 0x0, 0x0, 0x0, 0x1}, 0x20) 20:54:43 executing program 1: msgget$private(0x0, 0x403) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'L-', 0xfffffffffffffff8}, 0x28, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000080)=ANY=[]) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000cc0), 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000380)="0f070f20616426660fe855090f350f22e4c4e205a622f20f5a2666baf80cb8ccae358eef66bafc0cb872000000efb805000000b9000000000f01d9b9800000c00f3235000800000f30", 0x49}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:54:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x0, 0x2, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x78}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 20:54:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 1108.240361] kauditd_printk_skb: 115 callbacks suppressed [ 1108.240376] audit: type=1400 audit(1542920083.768:4816): avc: denied { map } for pid=2741 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.422506] audit: type=1400 audit(1542920083.778:4817): avc: denied { map } for pid=2741 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 1108.484635] audit: type=1400 audit(1542920083.778:4818): avc: denied { map } for pid=2741 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.645740] audit: type=1400 audit(1542920083.808:4819): avc: denied { map } for pid=2741 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.822437] audit: type=1400 audit(1542920083.818:4820): avc: denied { map } for pid=2740 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.982365] audit: type=1400 audit(1542920083.828:4821): avc: denied { map } for pid=2740 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1109.196901] audit: type=1400 audit(1542920083.838:4822): avc: denied { map } for pid=2740 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1109.536770] audit: type=1400 audit(1542920083.858:4823): avc: denied { map } for pid=2740 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x5) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) getgid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f68000)={@remote, 0x0, 0x0, 0x0, 0x1}, 0x20) 20:54:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cc"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1109.996301] audit: type=1400 audit(1542920083.888:4824): avc: denied { map } for pid=2740 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:45 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="0000feffffff000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000080)={0x0, 0x0, 0x3fc, 0x0, 0x3ff}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3f, 0x200002) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000000c0)=0xffffffff80000001) getgroups(0x5, &(0x7f0000000040)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setresgid(0x0, r2, r3) [ 1110.219211] audit: type=1400 audit(1542920083.888:4825): avc: denied { map } for pid=2741 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) close(r1) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup2(r1, r2) 20:54:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:54:46 executing program 0: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) 20:54:47 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x11) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r0 = syz_open_dev$mouse(&(0x7f0000000780)='/dev/input/mouse#\x00', 0x4, 0xfffffffffffffffc) semget$private(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') clone(0x802112001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000001c0)) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000002c0)=""/27) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/29, 0x1d, 0x7, 0x0, 0x7f, 0xffffffff, 0x7}, 0x120) read(r1, &(0x7f0000000040)=""/22, 0x16) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) semget$private(0x0, 0x3, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x5, 0x4) read(r1, &(0x7f0000000100)=""/133, 0x85) [ 1111.730229] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1111.945125] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1112.074102] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 20:54:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x5) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) getgid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f68000)={@remote, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 1112.116162] loop1: p1 p2 p3 p4 20:54:47 executing program 5: io_setup(0x1000000000005, &(0x7f0000000140)=0x0) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 20:54:47 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="0000feffffff000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000080)={0x0, 0x0, 0x3fc, 0x0, 0x3ff}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3f, 0x200002) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000000c0)=0xffffffff80000001) getgroups(0x5, &(0x7f0000000040)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setresgid(0x0, r2, r3) 20:54:48 executing program 0: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) 20:54:48 executing program 3: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) [ 1113.280230] kauditd_printk_skb: 123 callbacks suppressed [ 1113.280245] audit: type=1400 audit(1542920088.808:4949): avc: denied { map } for pid=2813 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1113.487970] audit: type=1400 audit(1542920088.868:4950): avc: denied { map } for pid=2812 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1113.646047] audit: type=1400 audit(1542920088.868:4951): avc: denied { map } for pid=2813 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:49 executing program 5: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) [ 1113.888295] audit: type=1400 audit(1542920088.888:4952): avc: denied { map } for pid=2812 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1114.087559] audit: type=1400 audit(1542920088.948:4953): avc: denied { map } for pid=2812 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:49 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020e00001000000000000000000000000800120000000100000000000000000006051ea0abc56b523000000000000000e000000100000000000000000000000000000000000000f9ff0020001d63da4f030006000000080002000080ac14ffbbf00000000000000003000500000000000200423b1d632b91c520000000000800"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 20:54:49 executing program 0: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) [ 1114.325721] audit: type=1400 audit(1542920088.948:4954): avc: denied { map } for pid=2812 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:49 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x11) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r0 = syz_open_dev$mouse(&(0x7f0000000780)='/dev/input/mouse#\x00', 0x4, 0xfffffffffffffffc) semget$private(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') clone(0x802112001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000001c0)) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000002c0)=""/27) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/29, 0x1d, 0x7, 0x0, 0x7f, 0xffffffff, 0x7}, 0x120) read(r1, &(0x7f0000000040)=""/22, 0x16) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) semget$private(0x0, 0x3, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x5, 0x4) read(r1, &(0x7f0000000100)=""/133, 0x85) 20:54:50 executing program 3: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) [ 1114.502298] audit: type=1400 audit(1542920088.958:4955): avc: denied { map } for pid=2813 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1114.605243] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1114.722696] audit: type=1400 audit(1542920088.958:4956): avc: denied { map } for pid=2813 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1114.747901] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1114.782838] loop1: p1 p2 p3 p4 [ 1114.850402] audit: type=1400 audit(1542920089.058:4957): avc: denied { map } for pid=2822 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1115.011966] audit: type=1400 audit(1542920089.058:4958): avc: denied { map } for pid=2813 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:50 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="0000feffffff000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000080)={0x0, 0x0, 0x3fc, 0x0, 0x3ff}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3f, 0x200002) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000000c0)=0xffffffff80000001) getgroups(0x5, &(0x7f0000000040)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setresgid(0x0, r2, r3) 20:54:51 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x8000000009, &(0x7f00000001c0)={0x0, 0x3e, 0x4, @tid=r0}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r1, &(0x7f0000000080)=""/128, 0xae3f1a6) timer_delete(0x0) 20:54:51 executing program 5: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) 20:54:51 executing program 0: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) 20:54:51 executing program 3: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) 20:54:52 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x11) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r0 = syz_open_dev$mouse(&(0x7f0000000780)='/dev/input/mouse#\x00', 0x4, 0xfffffffffffffffc) semget$private(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') clone(0x802112001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000001c0)) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000002c0)=""/27) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/29, 0x1d, 0x7, 0x0, 0x7f, 0xffffffff, 0x7}, 0x120) read(r1, &(0x7f0000000040)=""/22, 0x16) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) semget$private(0x0, 0x3, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x5, 0x4) read(r1, &(0x7f0000000100)=""/133, 0x85) 20:54:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) [ 1116.883305] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1116.932901] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1116.958308] loop1: p1 p2 p3 p4 20:54:52 executing program 5: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a0008000, 0x759, 0x8, 0x1, 0xff01000000000000, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f0000000100)=""/13}) r2 = getpid() get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xf780fdc6ab5d1843, &(0x7f0000000100), 0x28d, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ptrace$peek(0x3, r2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) 20:54:53 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="0000feffffff000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000080)={0x0, 0x0, 0x3fc, 0x0, 0x3ff}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3f, 0x200002) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000000c0)=0xffffffff80000001) getgroups(0x5, &(0x7f0000000040)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setresgid(0x0, r2, r3) 20:54:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/151) [ 1118.032925] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 20:54:53 executing program 4: setpgid(0x0, 0xffffffffffffffff) [ 1118.299824] kauditd_printk_skb: 141 callbacks suppressed [ 1118.299840] audit: type=1400 audit(1542920093.828:5100): avc: denied { map } for pid=2886 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:54 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000280), 0x10a5}}], 0x1, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x6800) [ 1118.500780] audit: type=1400 audit(1542920093.828:5101): avc: denied { map } for pid=2886 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1118.678210] audit: type=1400 audit(1542920093.908:5102): avc: denied { map } for pid=2886 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1118.928813] audit: type=1400 audit(1542920093.908:5103): avc: denied { map } for pid=2886 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:54 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x11) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r0 = syz_open_dev$mouse(&(0x7f0000000780)='/dev/input/mouse#\x00', 0x4, 0xfffffffffffffffc) semget$private(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') clone(0x802112001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000001c0)) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000002c0)=""/27) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/29, 0x1d, 0x7, 0x0, 0x7f, 0xffffffff, 0x7}, 0x120) read(r1, &(0x7f0000000040)=""/22, 0x16) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) semget$private(0x0, 0x3, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x5, 0x4) read(r1, &(0x7f0000000100)=""/133, 0x85) 20:54:54 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x210) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) [ 1119.029828] audit: type=1400 audit(1542920093.988:5104): avc: denied { map } for pid=2893 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1119.169428] audit: type=1400 audit(1542920094.008:5105): avc: denied { map } for pid=2893 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1119.370225] audit: type=1400 audit(1542920094.048:5106): avc: denied { map } for pid=2893 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:55 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x941042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) [ 1119.588292] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1119.622992] audit: type=1400 audit(1542920094.058:5107): avc: denied { map } for pid=2893 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1119.678210] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1119.732735] loop1: p1 p2 p3 p4 20:54:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) [ 1119.810974] audit: type=1400 audit(1542920094.148:5108): avc: denied { map } for pid=2893 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:55 executing program 0: perf_event_open(&(0x7f00000007c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f00000002c0)=0x7fffffffd) [ 1119.955937] audit: type=1400 audit(1542920094.198:5109): avc: denied { map } for pid=2893 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket(0x18, 0x0, 0x0) io_setup(0x6, &(0x7f00000001c0)=0x0) io_submit(r2, 0x2, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x121}]) 20:54:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x38, &(0x7f0000b67000), &(0x7f0000000040)=0x4) [ 1120.709124] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! 20:54:56 executing program 5: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000240)='ppp0!,GPL\'\x00') r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [{0x2, 0x2, r1}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x0, r2}, {0x8, 0x4}], {0x10, 0x2}, {0x20, 0x1}}, 0x44, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) syz_open_pts(0xffffffffffffffff, 0x185141) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) 20:54:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r1, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote, @rand_addr}, 0x6) getsockopt$inet6_int(r1, 0x29, 0x3b, &(0x7f0000000000), &(0x7f0000000040)=0x4) close(r1) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r2, 0x0) 20:54:56 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x941042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) 20:54:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000006, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f00000015c0), &(0x7f00000000c0)=0x4) 20:54:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x8000000000000005, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={"7465616d3000000000000000fa00", &(0x7f0000000040)=@ethtool_sfeatures={0x3}}) 20:54:57 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f00000000c0)={0x9}) 20:54:57 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) getpid() set_mempolicy(0xa, &(0x7f0000000000), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000140)=""/16) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f0000000300)={0x800000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000100)=""/7) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 1121.942347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2950 comm=syz-executor5 20:54:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) close(r1) 20:54:58 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = getpid() r1 = add_key$keyring(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300), 0x0, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000480)={0xffffffffffffffff}) accept4$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000600)=0x3b7, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000540)=0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000680)={0x0, @remote, @dev}, &(0x7f00000006c0)=0xc) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0), 0x7f8, r1) openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x4000, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) epoll_create1(0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x4000) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000180)={{0x5, 0x3, 0x8, 0x9, 'syz1\x00', 0x200}, 0x0, 0x0, 0x3, r0, 0x6, 0x0, 'syz0\x00', &(0x7f0000000080)=['rootmode', 'vboxnet0vmnet1mime_type@,wlan0/wlan0]\x00', '%.\x00', '/dev/fuse\x00', 'fuse\x00', '\x00'], 0x41, [], [0x20, 0xfffffffffffff040, 0x10000, 0x4]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) keyctl$instantiate(0xc, r1, &(0x7f0000000640)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '/dev/admmidi#\x00', 0x20, 0x4, 0x20, [0x34]}, 0x3c, 0x0) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f00000003c0)={&(0x7f00003e1000/0x2000)=nil, 0x2000}) 20:54:58 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x6800000000000000, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, 0x0) 20:54:58 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x941042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) 20:54:58 executing program 5: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000240)='ppp0!,GPL\'\x00') r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [{0x2, 0x2, r1}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x0, r2}, {0x8, 0x4}], {0x10, 0x2}, {0x20, 0x1}}, 0x44, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) syz_open_pts(0xffffffffffffffff, 0x185141) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) 20:54:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/15, 0xf}], 0x1) [ 1123.310395] kauditd_printk_skb: 150 callbacks suppressed [ 1123.310427] audit: type=1400 audit(1542920098.838:5260): avc: denied { map } for pid=2974 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1123.543050] audit: type=1400 audit(1542920098.838:5261): avc: denied { map } for pid=2973 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1123.578471] binder: 2981:2984 ioctl c0306201 2000dfd0 returned -14 20:54:59 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x6800000000000000, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, 0x0) [ 1123.723693] audit: type=1400 audit(1542920098.848:5262): avc: denied { map } for pid=2975 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:59 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000003d, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe000000fc000000, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) move_pages(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000300), &(0x7f0000000700), 0x0) [ 1123.951164] audit: type=1400 audit(1542920098.848:5263): avc: denied { map } for pid=2973 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1124.115317] audit: type=1400 audit(1542920098.848:5264): avc: denied { map } for pid=2975 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:59 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x941042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) 20:54:59 executing program 2: r0 = socket$inet(0x2, 0x802, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x8000, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1124.326454] audit: type=1400 audit(1542920098.888:5265): avc: denied { map } for pid=2979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:54:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f000078eff8)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000653fff)) r1 = creat(&(0x7f0000000080)='./file0/bus\x00', 0x0) mq_getsetattr(r1, 0x0, 0x0) [ 1124.503695] audit: type=1400 audit(1542920098.888:5266): avc: denied { map } for pid=2974 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1124.662860] audit: type=1400 audit(1542920098.898:5267): avc: denied { map } for pid=2979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1124.791650] binder: 2999:3004 ioctl c0306201 2000dfd0 returned -14 [ 1124.858443] audit: type=1400 audit(1542920098.928:5268): avc: denied { map } for pid=2975 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1124.983359] audit: type=1400 audit(1542920098.938:5269): avc: denied { map } for pid=2979 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:00 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x6800000000000000, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, 0x0) 20:55:01 executing program 2: r0 = getpgid(0x0) process_vm_writev(r0, &(0x7f0000000440)=[{&(0x7f0000001000)=""/4096, 0x1000}], 0x365, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/112, 0x70}, {0xffffffffffffffff, 0x267}], 0x2, 0x0) 20:55:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 20:55:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000020c0)={'bridge_slave_1\x00', 0x0}) bind$can_raw(r1, &(0x7f0000002100)={0x1d, r2}, 0x10) [ 1126.247286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3018 comm=syz-executor5 [ 1126.289841] binder: 3032:3033 ioctl c0306201 2000dfd0 returned -14 [ 1126.610248] netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. 20:55:02 executing program 5: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000240)='ppp0!,GPL\'\x00') r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [{0x2, 0x2, r1}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x0, r2}, {0x8, 0x4}], {0x10, 0x2}, {0x20, 0x1}}, 0x44, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) syz_open_pts(0xffffffffffffffff, 0x185141) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) 20:55:02 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x4}}) 20:55:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x22, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x10) 20:55:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062102, &(0x7f0000000240), 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e22, @remote}, {0x0, @broadcast}, 0x4, {0x2, 0x0, @rand_addr=0x101}, 'bridge0\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)) 20:55:02 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x6800000000000000, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, 0x0) 20:55:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pidc.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000380)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe00000000850000000b000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392d450ff1fb635a5849d20600000000000000e1"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x38, &(0x7f00000000c0)}, 0x10) 20:55:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x1000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast2, @loopback}, &(0x7f0000000280)=0xc) sendfile(r0, r1, 0x0, 0x10000) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10) r3 = dup2(r1, r0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000580), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000400)=@req3={0x1000, 0x4, 0x80000000, 0x9b93, 0x7fffffff, 0x1}, 0x1c) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000002840)='IPVS\x00') setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x50}, 0x4c000) write(r2, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000600)='./file0\x00', 0x4) inotify_rm_watch(r0, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000740)) [ 1127.398204] binder: 3055:3058 ioctl c0306201 2000dfd0 returned -14 20:55:03 executing program 4: add_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={'syz'}, &(0x7f0000000300), 0x0, 0xfffffffffffffffe) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0x7ffffffb) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0x10000) 20:55:03 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(r1, 0x1, 0x2, 0x5) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000000) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000080)={0x0, 0x5, 0x7fff, 0x6, '\x00', 0x8}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) r5 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r4, 0x0, 0x2, &(0x7f0000000240)='%\x00'}, 0x30) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000003c0)=ANY=[], 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) 20:55:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062102, &(0x7f0000000240), 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e22, @remote}, {0x0, @broadcast}, 0x4, {0x2, 0x0, @rand_addr=0x101}, 'bridge0\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)) 20:55:03 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0xe25d, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000000)={0xf}) [ 1128.315488] kauditd_printk_skb: 130 callbacks suppressed [ 1128.315503] audit: type=1400 audit(1542920103.848:5400): avc: denied { map } for pid=3087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1128.540980] audit: type=1400 audit(1542920103.848:5401): avc: denied { map } for pid=3074 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:04 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"7465616d30001000"}) [ 1128.760751] audit: type=1400 audit(1542920103.848:5402): avc: denied { map } for pid=3074 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1128.981716] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1128.985176] audit: type=1400 audit(1542920103.898:5403): avc: denied { map } for pid=3087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1129.006903] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1129.017812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1129.027376] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1129.033262] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1129.033275] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 1129.125905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3094 comm=syz-executor5 20:55:05 executing program 5: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000240)='ppp0!,GPL\'\x00') r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [{0x2, 0x2, r1}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x0, r2}, {0x8, 0x4}], {0x10, 0x2}, {0x20, 0x1}}, 0x44, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) syz_open_pts(0xffffffffffffffff, 0x185141) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) 20:55:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062102, &(0x7f0000000240), 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e22, @remote}, {0x0, @broadcast}, 0x4, {0x2, 0x0, @rand_addr=0x101}, 'bridge0\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)) 20:55:05 executing program 4: unshare(0x20000400) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, 0x0) 20:55:05 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(r1, 0x1, 0x2, 0x5) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000000) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000080)={0x0, 0x5, 0x7fff, 0x6, '\x00', 0x8}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) r5 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r4, 0x0, 0x2, &(0x7f0000000240)='%\x00'}, 0x30) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000003c0)=ANY=[], 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) 20:55:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)="696f2e6d617800e3c6a1bc1694706052fb71636dab87f6b67931756f4718d4c82a523684fbfb550900000000000000e83351f1daed56ac269c9286207493b4a58dbdb53c1a90a355b97bba99df289a25ef0e4f35cdbfe70a13c32b283c02837c5330ed0f393ac8b5a0220078e91fe9ee17882519e39d9d7c502cb52b84aa1c5a64b1666adec7f0d844af01018e958358b9f54ab00b0f43d38e9de11e3a217ca325d2404d1bf3fef194ff6c7e18ed70a0109f6ecd9e4b89f3a01f93f3c0860459d5d52cc4f53879ec0c16709f7337b7c98529e41c0ddde4e69143ec0e0e22de0c99e3ba500e94cd1f586c1113e3cf2b3e308d01d4c3df000e446e059d489fa7ce431844e3f11eb8a49daeb919a11aa6138671292f7885168b32d5826453d716fcc6b3f690a614881c3bae788228e0ab91f02c9f3df29167f0c9", 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000000) 20:55:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 20:55:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062102, &(0x7f0000000240), 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e22, @remote}, {0x0, @broadcast}, 0x4, {0x2, 0x0, @rand_addr=0x101}, 'bridge0\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)) 20:55:06 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 20:55:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000000000000000000040000000000000000006cfb26ca"]) 20:55:06 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(r1, 0x1, 0x2, 0x5) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000000) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000080)={0x0, 0x5, 0x7fff, 0x6, '\x00', 0x8}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) r5 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r4, 0x0, 0x2, &(0x7f0000000240)='%\x00'}, 0x30) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000003c0)=ANY=[], 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) 20:55:07 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./bus\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[{@resize_auto='resize=\nuto'}]}) 20:55:07 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) [ 1132.628452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3174 comm=syz-executor5 20:55:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') recvmmsg(r1, &(0x7f0000005240)=[{{&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000000880), 0x0, &(0x7f0000000940)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f00000054c0)={0x0, 0x1c9c380}) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000056c0)={&(0x7f00000000c0), 0xc, &(0x7f0000005680)={&(0x7f0000005600)=ANY=[]}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f0000000400)={&(0x7f0000000040)={0x1c, r2, 0x5, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}}, 0x0) 20:55:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@setlink={0x2c, 0x13, 0x811, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) 20:55:08 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./bus\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[{@resize_auto='resize=\nuto'}]}) 20:55:08 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 20:55:08 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 20:55:08 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(r1, 0x1, 0x2, 0x5) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000000) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000080)={0x0, 0x5, 0x7fff, 0x6, '\x00', 0x8}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) r5 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r4, 0x0, 0x2, &(0x7f0000000240)='%\x00'}, 0x30) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000003c0)=ANY=[], 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) 20:55:08 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./bus\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[{@resize_auto='resize=\nuto'}]}) [ 1133.412763] kauditd_printk_skb: 201 callbacks suppressed [ 1133.412780] audit: type=1400 audit(1542920108.928:5587): avc: denied { map } for pid=3185 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x480, 0x80) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000200)) r1 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x4e22, @dev}, 0x80, &(0x7f0000001180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000000000000000000000700000010000000000000000000000007000000"], 0x20}}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000140)="a4") getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f00000000c0)) ioctl(r4, 0x8912, &(0x7f0000000040)="0a5cc80700315f8571") socket$nl_netfilter(0x10, 0x3, 0xc) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 1133.566475] audit: type=1400 audit(1542920108.978:5588): avc: denied { map } for pid=3185 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1133.742743] audit: type=1400 audit(1542920109.038:5589): avc: denied { create } for pid=3193 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:55:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='.', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) [ 1133.919765] audit: type=1400 audit(1542920109.078:5590): avc: denied { create } for pid=3193 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1134.089596] audit: type=1400 audit(1542920109.078:5591): avc: denied { write } for pid=3193 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:55:09 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/132}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYRES16], 0x1}}, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) [ 1134.273160] audit: type=1400 audit(1542920109.098:5592): avc: denied { read } for pid=3193 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:55:09 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) [ 1134.492501] audit: type=1400 audit(1542920109.158:5593): avc: denied { read } for pid=3193 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:55:10 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./bus\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[{@resize_auto='resize=\nuto'}]}) [ 1134.678059] audit: type=1400 audit(1542920109.188:5594): avc: denied { write } for pid=3193 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1134.720073] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1134.729746] audit: audit_backlog=65 > audit_backlog_limit=64 20:55:11 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000007080)={@broadcast, @local}, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000007100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007140)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007240)={{{@in6, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000007340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 20:55:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 20:55:11 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x10000}) 20:55:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x19}]}}}]}, 0x1a6}}, 0x0) 20:55:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) shmctl$IPC_RMID(0x0, 0x198) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:55:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x14, &(0x7f0000000040)={0x1, 0x20}, 0x2c) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x7ff, 0x6, @broadcast}, 0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 20:55:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xe16069b6985a83a6) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) 20:55:12 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x10000}) [ 1137.078781] netlink: 'syz-executor4': attribute type 25 has an invalid length. 20:55:12 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0xfffffffd) ioctl(r0, 0x8911, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r3, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe005, 0x1, &(0x7f0000000380)=[{&(0x7f0000000400)="eb3c90ad00027000f80100000000000000000000000000000000000000000000", 0x20}], 0x10808410, &(0x7f0000000340)=ANY=[]) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp, 0x0, 0x40000000000000, 0x0, 0x0, 0x3, 0x0, 0x4}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r5, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x89, 0x3, 0xca, 0xca30}) r8 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r7, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x0, 0x80000000, 0x80, 0x1}, 0xc) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x10000, 0x0) write$cgroup_type(r9, &(0x7f00000009c0)='threaded\x00', 0x5) mkdirat(r4, &(0x7f0000000340)='./file1\x00', 0x100000000) creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44) fchdir(r8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) fstatfs(r7, &(0x7f00000004c0)=""/128) [ 1137.180129] (unnamed net_device) (uninitialized): option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) 20:55:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x20) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000640)="2ad4d425e960", 0x6) fcntl$setstatus(r3, 0x4, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040), 0x10000000000443) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r3, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) mount(&(0x7f0000002540)=ANY=[], &(0x7f000000fff8)='./file0\x00', &(0x7f0000032ffb)='fuse\x00', 0x0, &(0x7f0000032000)) 20:55:12 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000000400), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f000000ef80)={0x1, 0x802, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "790eaada477f17eb046695eea58af88d0ba3b8f5ca34f33a9a82d81e455bc6ca3479893215467e3bb85ea1247aafde2b17277187bd8fc023bb972d19343108b0"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00000000c0)={&(0x7f0000010ff0)={0x1d, r2}, 0xdc, &(0x7f000000eff0)={&(0x7f0000000040)={0x3, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "151820f66956ad91"}}, 0x80}}, 0x0) 20:55:13 executing program 5: futex(&(0x7f000000cffc)=0x200000004, 0x80, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0x83, 0x0, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000000080), 0x0) [ 1138.106037] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1138.160546] netlink: 'syz-executor0': attribute type 29 has an invalid length. 20:55:13 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x10000}) [ 1138.434546] kauditd_printk_skb: 232 callbacks suppressed [ 1138.434562] audit: type=1400 audit(1542920113.958:5778): avc: denied { map } for pid=3291 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:14 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xe16069b6985a83a6) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) [ 1138.683862] audit: type=1400 audit(1542920113.968:5780): avc: denied { map } for pid=3297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:14 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000c03000)=[@in], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000564000), &(0x7f0000000000)=0xffe4) shmdt(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x10) capget(&(0x7f0000000080)={0x399f1736}, &(0x7f0000000100)={0x0, 0x3, 0x9, 0x100000001}) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000000), 0x73) sendto$inet6(r1, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) [ 1138.830480] audit: type=1400 audit(1542920113.968:5781): avc: denied { map } for pid=3297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1138.952241] audit: type=1400 audit(1542920113.968:5782): avc: denied { map } for pid=3297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000000)={0x6, 0x0, [{0x40000000}]}) 20:55:14 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60020000a84302910000003900080008000c00020000000d000500fe8042000000c78b80082314e9030b9d566885b16732009b84e7b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 1139.067147] audit: type=1400 audit(1542920113.958:5779): avc: denied { map } for pid=3291 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1139.241687] audit: type=1400 audit(1542920114.038:5783): avc: denied { map } for pid=3291 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1139.340090] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1139.366408] audit: type=1400 audit(1542920114.068:5784): avc: denied { map } for pid=3297 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:15 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x10000}) [ 1139.413025] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1139.511334] audit: type=1400 audit(1542920114.078:5785): avc: denied { map } for pid=3295 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:15 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xe16069b6985a83a6) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) 20:55:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000000), 0xc, &(0x7f0000023ff0)={&(0x7f0000000140)={0x1c, 0x28, 0xaff, 0x0, 0x0, {0x4}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1139.624734] audit: type=1400 audit(1542920114.118:5786): avc: denied { map } for pid=3291 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1139.763779] audit: type=1400 audit(1542920114.118:5787): avc: denied { map } for pid=3291 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r0 = socket(0x10, 0x20000000802, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000380), 0x1) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x18000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000500)={0x8, 0x4, [], {0x0, @reserved}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) delete_module(&(0x7f00000000c0)='vfat\x00', 0x0) r5 = eventfd2(0x0, 0x800) r6 = eventfd(0x6) recvmsg(r0, &(0x7f00000009c0)={&(0x7f00000005c0)=@in, 0x80, &(0x7f0000000940)=[{&(0x7f0000000680)=""/54, 0x36}, {&(0x7f00000006c0)=""/119, 0x77}, {&(0x7f0000000740)=""/160, 0xa0}, {&(0x7f0000000800)=""/15, 0xf}, {&(0x7f0000000840)=""/238, 0xee}], 0x5, 0x0, 0x0, 0x2}, 0x10000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000003c0)=0x400000) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x40041, 0x0) setns(r7, 0x50000000) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000100)={0x0, &(0x7f00000000c0), 0x0, r5}) ioctl$int_in(r3, 0x5452, &(0x7f0000000a00)) getsockname$llc(r0, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x10) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r5, 0x111, 0x5, 0x1, 0x4) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000a40)) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x400001, 0x0) setsockopt$RDS_GET_MR(r8, 0x114, 0x2, &(0x7f0000000c00)={{&(0x7f0000000ac0)=""/219, 0xdb}, &(0x7f0000000bc0), 0x2}, 0x20) 20:55:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x2c, 0x0, @dev={0xfe, 0x80, [0x0, 0x800e0000]}, @local, {[], @dccp={{0x2c00, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, 0x0) 20:55:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000000)={0x6, 0x0, [{0x40000000}]}) 20:55:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4002, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r8, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) 20:55:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x88000, 0x0) fchmod(r1, 0x100) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0xffffffffffffffa1) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) msgctl$IPC_RMID(r4, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r6}) write$binfmt_script(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x0) 20:55:16 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xe16069b6985a83a6) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) 20:55:16 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in, 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) 20:55:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x8) sendto$inet(r0, &(0x7f0000000000)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) [ 1141.607081] hugetlbfs: syz-executor3 (3353): Using mlock ulimits for SHM_HUGETLB is deprecated [ 1141.742659] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1141.750293] netlink: 'syz-executor0': attribute type 29 has an invalid length. 20:55:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000000)={0x6, 0x0, [{0x40000000}]}) 20:55:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4002, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r8, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) 20:55:17 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000180)={'gre0\x00', @ifru_flags}) 20:55:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 20:55:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) 20:55:18 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x1ce, 0x7ffffffff000) 20:55:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x2, "9f"}, 0x2eff) [ 1143.458187] kauditd_printk_skb: 171 callbacks suppressed [ 1143.458202] audit: type=1400 audit(1542920118.988:5959): avc: denied { map } for pid=3385 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000000)={0x6, 0x0, [{0x40000000}]}) 20:55:19 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300)=0x7, 0x12) [ 1143.670512] audit: type=1400 audit(1542920118.998:5960): avc: denied { map } for pid=3385 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4002, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r8, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) 20:55:19 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) [ 1143.896909] audit: type=1400 audit(1542920119.028:5961): avc: denied { map } for pid=3389 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1144.134037] audit: type=1400 audit(1542920119.038:5962): avc: denied { map } for pid=3387 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:19 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000200)=0x176) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0xa, 0x3, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYBLOB="00020300"], &(0x7f0000000240)=0x1) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000200)) 20:55:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="f6"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1144.352642] audit: type=1400 audit(1542920119.038:5963): avc: denied { map } for pid=3387 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1144.562636] audit: type=1400 audit(1542920119.038:5964): avc: denied { map } for pid=3389 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1144.756941] audit: type=1400 audit(1542920119.058:5965): avc: denied { map } for pid=3384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1144.932640] audit: type=1400 audit(1542920119.068:5966): avc: denied { map } for pid=3386 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300)=0x7, 0x12) [ 1145.121770] audit: type=1400 audit(1542920119.078:5967): avc: denied { map } for pid=3386 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1145.284785] audit: type=1400 audit(1542920119.098:5968): avc: denied { map } for pid=3384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:21 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x15, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) [ 1145.472831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1145.479515] bridge0: port 1(bridge_slave_0) entered disabled state 20:55:21 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) getsockopt$packet_buf(r3, 0x111, 0x3, &(0x7f0000000400)=""/162, &(0x7f0000000040)=0xa2) 20:55:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/24, 0x18) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {}, {}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000840)={0x3, &(0x7f0000000680)=[{}, {}, {}]}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(r1) r3 = gettid() getpgrp(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x8, &(0x7f00000036c0)=[r1, r7, r7, r1, r7, r1, r7, r7]) getrlimit(0xb, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'veth1_to_bridge\x00', 0x3}, 0x18) setresuid(0x0, r6, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='ppp0$vboxnet1procem1&vmnet0^nodev\x00', 0xffffffffffffff9c}, 0x10) creat(&(0x7f0000000880)='./file0\x00', 0x80) syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7fffffff, 0x250a02) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400840, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000003580)='btrfs\x00', r2}, 0x10) syz_open_dev$mouse(&(0x7f0000004340)='/dev/input/mouse#\x00', 0x3, 0x80) openat$vcs(0xffffffffffffff9c, &(0x7f0000004380)='/dev/vcs\x00', 0x4002, 0x0) socketpair(0x18, 0x804, 0x200, &(0x7f00000043c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r8, 0x3) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x0, 0x20001) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) sched_rr_get_interval(r5, &(0x7f0000000480)) 20:55:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300)=0x7, 0x12) [ 1146.302989] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1146.332695] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=3440 comm=syz-executor1 [ 1146.600865] bridge0: port 2(bridge_slave_1) entered blocking state [ 1146.607280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1146.614040] bridge0: port 1(bridge_slave_0) entered blocking state [ 1146.620418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1146.692917] device bridge0 entered promiscuous mode [ 1146.721509] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=3437 comm=syz-executor1 20:55:22 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0x1265, 0x0) 20:55:22 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 20:55:22 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x15, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 20:55:22 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300)=0x7, 0x12) 20:55:22 executing program 4: ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000004880)={'ip6gretap0\x00', @ifru_flags}) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) dup3(r1, r0, 0x80000) 20:55:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @random="1d5a57644a20"}, 0x0, {}, 'syz_tun\x00'}) 20:55:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x0, 0x0, 0x10000010005}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) [ 1147.577982] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=3453 comm=syz-executor1 20:55:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000bfdfdc)={0x14, 0x0, 0xb, 0x800000001}, 0x14}}, 0x0) 20:55:23 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720004, 0xffffffff7ff0bdbe, 0x1020000}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) dup(r0) socketpair$packet(0x11, 0x0, 0x300, 0x0) 20:55:23 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x15, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) [ 1148.130398] bridge0: port 2(bridge_slave_1) entered disabled state [ 1148.137130] bridge0: port 1(bridge_slave_0) entered disabled state 20:55:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @random="1d5a57644a20"}, 0x0, {}, 'syz_tun\x00'}) [ 1148.474752] kauditd_printk_skb: 158 callbacks suppressed [ 1148.474768] audit: type=1400 audit(1542920124.008:6127): avc: denied { create } for pid=3471 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1148.591427] audit: type=1400 audit(1542920124.048:6128): avc: denied { map } for pid=3472 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af00, 0x0) [ 1148.730140] audit: type=1400 audit(1542920124.098:6129): avc: denied { map } for pid=3472 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x0, 0x0, 0x10000010005}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 20:55:24 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720004, 0xffffffff7ff0bdbe, 0x1020000}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) dup(r0) socketpair$packet(0x11, 0x0, 0x300, 0x0) [ 1148.948629] audit: type=1400 audit(1542920124.108:6130): avc: denied { map } for pid=3472 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1149.019801] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=3483 comm=syz-executor1 [ 1149.072714] audit: type=1400 audit(1542920124.108:6131): avc: denied { write } for pid=3471 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1149.237102] audit: type=1400 audit(1542920124.138:6132): avc: denied { create } for pid=3471 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1149.278170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1149.284645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1149.291342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1149.297812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1149.357508] audit: type=1400 audit(1542920124.148:6133): avc: denied { map } for pid=3472 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1149.394182] device bridge0 entered promiscuous mode [ 1149.437373] audit: type=1400 audit(1542920124.148:6134): avc: denied { map } for pid=3472 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:25 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x15, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 20:55:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @random="1d5a57644a20"}, 0x0, {}, 'syz_tun\x00'}) [ 1149.469780] audit: type=1400 audit(1542920124.278:6135): avc: denied { map } for pid=3472 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x40c1, 0x800000000) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x1000d) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000040)=0x60) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000140)={0x0, 0xd000, 0x7, 0x0, 0x1}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xc0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)=""/209, 0x10f, 0xd1}, 0x20) ioctl$FICLONE(r2, 0x40049409, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='cgroup\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'bridge_slave_1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000400000003000000000000afe3891fbc82792e24e3d7fe0000000000"], &(0x7f0000000180)='syzkaller\x00', 0x10001, 0xea, &(0x7f0000000200)=""/234, 0x41100, 0x1, [], r4, 0x3}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000006c0)=""/236, &(0x7f00000007c0)=0xec) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 20:55:25 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc2604111, &(0x7f0000000140)="673f3d3f35c165f0050f4b71c653d2ea89d40feb04cfcf45aabedaa4bd7bb9bc52266b08b53491fa4079fbb765a15d8fe08c8b80c2e9f19d379f169fe07af489f8fb2aa167") [ 1149.641415] audit: type=1400 audit(1542920124.278:6136): avc: denied { map } for pid=3472 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:25 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720004, 0xffffffff7ff0bdbe, 0x1020000}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) dup(r0) socketpair$packet(0x11, 0x0, 0x300, 0x0) 20:55:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x0, 0x0, 0x10000010005}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) [ 1150.238863] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=3499 comm=syz-executor1 20:55:26 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000018c0)=[@cswp={0x58, 0x114, 0x7, {{}, &(0x7f0000001780), &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x0, 0x60}}], 0x58}, 0x0) 20:55:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @random="1d5a57644a20"}, 0x0, {}, 'syz_tun\x00'}) 20:55:26 executing program 5: io_setup(0x8, &(0x7f0000000000)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:55:26 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720004, 0xffffffff7ff0bdbe, 0x1020000}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) dup(r0) socketpair$packet(0x11, 0x0, 0x300, 0x0) 20:55:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x0, 0x0, 0x10000010005}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 20:55:26 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000000)) [ 1151.605174] rds_sendmsg: 3 callbacks suppressed [ 1151.605185] atomic_op 00000000f43d060d conn xmit_atomic (null) 20:55:27 executing program 5: io_setup(0x8, &(0x7f0000000000)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:55:27 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$KVM_CREATE_VCPU(r1, 0x8004550f, 0x0) 20:55:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x40c1, 0x800000000) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x1000d) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000040)=0x60) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000140)={0x0, 0xd000, 0x7, 0x0, 0x1}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xc0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)=""/209, 0x10f, 0xd1}, 0x20) ioctl$FICLONE(r2, 0x40049409, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='cgroup\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'bridge_slave_1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000400000003000000000000afe3891fbc82792e24e3d7fe0000000000"], &(0x7f0000000180)='syzkaller\x00', 0x10001, 0xea, &(0x7f0000000200)=""/234, 0x41100, 0x1, [], r4, 0x3}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000006c0)=""/236, &(0x7f00000007c0)=0xec) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 20:55:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)="63707526307861000000010000019cd30e35a01d3d040a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83f82e2d2000000028e9604401695c8d6c866c68a8fc80de2c4b74f423c55d593bc13676f9890906be2aaa26bd1678518ef3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d5835af657010520b26afa8247f3756ed4c4a34cf0701d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c0914901000000010000004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75ffe1fe586b1787526fbf2bfe87f9193ab05003485866c8d000000000000000000000000000000") creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x0, 0x70bd27, 0x25dfdbff}, 0x14}}, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, &(0x7f00000007c0)}) 20:55:27 executing program 2: clone(0x8000000000041fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace(0x8, r0) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000040)={0x1d, 0x0, 0x6}) 20:55:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)=0x6) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x0, [0x40000000]}) 20:55:28 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={"73797a5f74756e000000e1ffffff00", 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x1e, &(0x7f0000000380)={@empty, @remote, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "199ac0f1ca9a7443"}}}}, &(0x7f0000000000)) 20:55:28 executing program 5: io_setup(0x8, &(0x7f0000000000)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:55:28 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x22, &(0x7f0000000180), 0x4) 20:55:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)="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") creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x0, 0x70bd27, 0x25dfdbff}, 0x14}}, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, &(0x7f00000007c0)}) 20:55:28 executing program 3: syz_mount_image$iso9660(&(0x7f0000000700)='iso9660\x00', &(0x7f0000000740)='./file0\x00', 0x9, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002b40)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[]]) r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback}, 0x10) unshare(0x0) pipe(&(0x7f0000000500)) unshare(0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x4e22, 0x3}, {0x5, 0x9, 0x0, 0x0, 0x3f, 0x0, 0x6}, {}, 0x7f, 0x6e6bb4, 0x0, 0x0, 0x3}, {{@in=@rand_addr}, 0x0, @in6=@mcast2, 0x34ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7}}, 0xe8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000440)=0xffffffffffffdab0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f00000003c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, &(0x7f0000000640)) mknodat(r1, &(0x7f0000000000)='./file1\x00', 0x1200, 0x0) [ 1153.532974] kauditd_printk_skb: 136 callbacks suppressed [ 1153.532989] audit: type=1400 audit(1542920128.948:6273): avc: denied { map } for pid=3567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1153.772036] audit: type=1400 audit(1542920129.048:6274): avc: denied { map } for pid=3567 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.046824] audit: type=1400 audit(1542920129.048:6275): avc: denied { map } for pid=3567 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.281876] audit: type=1400 audit(1542920129.198:6276): avc: denied { map } for pid=3567 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.456156] audit: type=1400 audit(1542920129.208:6277): avc: denied { map } for pid=3567 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.629228] audit: type=1400 audit(1542920129.288:6279): avc: denied { map } for pid=3567 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.779954] audit: type=1400 audit(1542920129.248:6278): avc: denied { map } for pid=3571 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.892877] audit: type=1400 audit(1542920129.298:6280): avc: denied { map } for pid=3571 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1154.982696] audit: type=1400 audit(1542920129.368:6281): avc: denied { map } for pid=3571 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1155.041377] audit: type=1400 audit(1542920129.408:6282): avc: denied { map } for pid=3571 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:31 executing program 5: io_setup(0x8, &(0x7f0000000000)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:55:31 executing program 1: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) futex(&(0x7f0000000000)=0x1, 0x0, 0x1, 0x0, 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000015) 20:55:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x40c1, 0x800000000) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x1000d) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000040)=0x60) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000140)={0x0, 0xd000, 0x7, 0x0, 0x1}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xc0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)=""/209, 0x10f, 0xd1}, 0x20) ioctl$FICLONE(r2, 0x40049409, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='cgroup\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'bridge_slave_1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000400000003000000000000afe3891fbc82792e24e3d7fe0000000000"], &(0x7f0000000180)='syzkaller\x00', 0x10001, 0xea, &(0x7f0000000200)=""/234, 0x41100, 0x1, [], r4, 0x3}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000006c0)=""/236, &(0x7f00000007c0)=0xec) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 20:55:31 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, 0x0) chroot(&(0x7f0000000500)='./file0\x00') perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 20:55:31 executing program 3: socket$inet6(0xa, 0x20800a2, 0x0) ioctl(0xffffffffffffffff, 0x8915, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x1, 0x0, 0x4e21}, {0x0}, 0x0}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x7, 0x0) io_setup(0x0, 0x0) io_setup(0x0, 0x0) io_setup(0x8, &(0x7f0000000100)) io_setup(0x0, 0x0) io_destroy(0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x8026, 0x5, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000080)) close(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getresuid(&(0x7f0000000440), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) 20:55:32 executing program 1: r0 = semget$private(0x0, 0x400000000000007, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semtimedop(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 20:55:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)="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") creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x0, 0x70bd27, 0x25dfdbff}, 0x14}}, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, &(0x7f00000007c0)}) 20:55:32 executing program 5: socket$inet6(0xa, 0x20800a2, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x1, 0x0, 0x4e21}, {0x0}, 0x0}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x141000, 0x0) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x7, 0x0) io_setup(0x3fd, &(0x7f0000000140)) io_destroy(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x9, 0x0, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7, 0x7fff, 0x0, 0x7f, 0x7, 0x0, 0x4, 0x7f, 0x0, 0x8, 0x0, 0x100000000, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x8026, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x4000000000000005, 0x8) ioctl(r3, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r4 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) close(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@local, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff}, 0x20) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a45323, &(0x7f0000000480)={{0x80000000000000, 0xffffffff}, 'port1\x00', 0x20, 0x100000, 0x2, 0x5, 0x5, 0xf6b8, 0x0, 0x0, 0x3}) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000200)) getpgid(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000580)={0x0, 0x0}) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f00000001c0)=r6) 20:55:33 executing program 1: r0 = semget$private(0x0, 0x400000000000007, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semtimedop(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 20:55:33 executing program 3: socket$inet6(0xa, 0x20800a2, 0x0) ioctl(0xffffffffffffffff, 0x8915, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x1, 0x0, 0x4e21}, {0x0}, 0x0}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x7, 0x0) io_setup(0x0, 0x0) io_setup(0x0, 0x0) io_setup(0x8, &(0x7f0000000100)) io_setup(0x0, 0x0) io_destroy(0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x8026, 0x5, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000080)) close(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getresuid(&(0x7f0000000440), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) 20:55:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000000180)}}, {{0x0, 0x0, &(0x7f0000002bc0), 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0x4, "1554"}], 0x18}}], 0x2, 0x0) [ 1158.572383] kauditd_printk_skb: 110 callbacks suppressed [ 1158.572399] audit: type=1400 audit(1542920134.098:6393): avc: denied { map } for pid=3623 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1158.733929] audit: type=1400 audit(1542920134.108:6394): avc: denied { map } for pid=3623 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:34 executing program 1: r0 = semget$private(0x0, 0x400000000000007, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semtimedop(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) [ 1158.924440] audit: type=1400 audit(1542920134.158:6395): avc: denied { create } for pid=3616 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1159.080727] audit: type=1400 audit(1542920134.208:6396): avc: denied { map } for pid=3623 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)="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") creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x0, 0x70bd27, 0x25dfdbff}, 0x14}}, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, &(0x7f00000007c0)}) [ 1159.239461] audit: type=1400 audit(1542920134.208:6397): avc: denied { map } for pid=3623 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:34 executing program 2: mkdir(&(0x7f0000000980)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f00000015c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchmod(r1, 0xa) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) [ 1159.364199] audit: type=1400 audit(1542920134.238:6398): avc: denied { write } for pid=3616 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1159.470751] audit: type=1400 audit(1542920134.238:6399): avc: denied { map } for pid=3627 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1159.622724] audit: type=1400 audit(1542920134.238:6400): avc: denied { map } for pid=3627 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1159.828980] audit: type=1400 audit(1542920134.268:6401): avc: denied { map } for pid=3627 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1159.970697] audit: type=1400 audit(1542920134.268:6402): avc: denied { map } for pid=3627 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x40c1, 0x800000000) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x1000d) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000040)=0x60) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000140)={0x0, 0xd000, 0x7, 0x0, 0x1}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xc0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)=""/209, 0x10f, 0xd1}, 0x20) ioctl$FICLONE(r2, 0x40049409, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='cgroup\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'bridge_slave_1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000400000003000000000000afe3891fbc82792e24e3d7fe0000000000"], &(0x7f0000000180)='syzkaller\x00', 0x10001, 0xea, &(0x7f0000000200)=""/234, 0x41100, 0x1, [], r4, 0x3}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000006c0)=""/236, &(0x7f00000007c0)=0xec) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 20:55:35 executing program 3: socket$inet6(0xa, 0x20800a2, 0x0) ioctl(0xffffffffffffffff, 0x8915, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x1, 0x0, 0x4e21}, {0x0}, 0x0}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x7, 0x0) io_setup(0x0, 0x0) io_setup(0x0, 0x0) io_setup(0x8, &(0x7f0000000100)) io_setup(0x0, 0x0) io_destroy(0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x8026, 0x5, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000080)) close(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getresuid(&(0x7f0000000440), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) 20:55:35 executing program 5: r0 = inotify_init() mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) inotify_add_watch(r0, &(0x7f000003a000)='./control\x00', 0x20) creat(&(0x7f000001cff0)='./control/file0\x00', 0x0) creat(&(0x7f0000000140)='./control//ile0\x00', 0x0) 20:55:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") r1 = socket$netlink(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f00000054c0), 0x1, 0x0, &(0x7f0000000040)) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000023000)={&(0x7f0000024000), 0xc, &(0x7f00000000c0)={&(0x7f0000000000)={0x14, 0x28, 0xaff, 0x0, 0x0, {0x5803}}, 0x14}}, 0x0) 20:55:35 executing program 1: r0 = semget$private(0x0, 0x400000000000007, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semtimedop(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 20:55:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000180)={0x5, 0x40, 0x122, 0x100}) r5 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)="628671435790a82a4ddb5fbb0bdf62a709916f146370a6ecc13cee67a93d6a0f5226c536dde403337d95294394a86faaff37c03561727dd124418ea0057e50b69a58d9125237f582eade7b0f7f5293cc7ac2eedf8c33a20816dd6309bf52555e4bcc5d7ee4475e68799dcbde9a989f32e22b3b36e5f82fd8006f29abc6a72b019b85fd1fb9851693a92f9a71eade33b40a9fb0b5d93d895e1ae182b7c5b76da18a1ef4db2236bacd56e5772ae4cecc507614dc8a92c599fee07f70681decac9ba6a55bd0905b7cedd9ab3f9d", 0xcc}], 0x1, &(0x7f0000000740), 0x0, 0x10}, 0x4000010) getsockopt$XDP_STATISTICS(r5, 0x11b, 0x7, &(0x7f0000000440), &(0x7f00000005c0)=0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x500, 0x0) r6 = gettid() getgid() writev(r0, &(0x7f0000000500)=[{&(0x7f0000000480)="2b1cbccc40004dd548226dbf7865af0dc9725484e5699dfe9f02d29fd620910b60499e1aaf7d636cf32399ed1ff8ec7e26c97b9f42be07a0eb907d11cdb44393ae5f3fa533acef1f26301abd3d0fdf80fe8018bbf20ac026656b471e3e887124d3b9c9", 0x63}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, &(0x7f0000000000)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)=r6) sendmsg$alg(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001900)="591dfdef4e36437bcc2fe7624547b950b975cc0c815d26aef4f008c6923c210f560546d90815f7caaf08226f44c7de94fcae5051073d0cc8e3150754f5b68720861bd8cc72551ce6bf973bab472df4a4b9a15c1e2d78f104680e9edd3354a8c114e77587a3b3aa6f15e24b6ae54f757c6a8826cd78efb859ee617907f9de5f5e7284d0", 0x83}], 0x1, &(0x7f0000000440), 0x0, 0x4000}, 0x40000) tkill(r6, 0x1004000000016) fgetxattr(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="737973ffffff7f000000007972696e67007ce77cd3dcec7ecec5bf43812f8957f1628a41e20e75764ea830"], &(0x7f0000000300)=""/127, 0x7f) close(r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000600)=0xc) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x7, 0x2, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x1, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x800, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x2, 0x2}]}) dup3(r2, r1, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r7) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) 20:55:36 executing program 3: socket$inet6(0xa, 0x20800a2, 0x0) ioctl(0xffffffffffffffff, 0x8915, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x1, 0x0, 0x4e21}, {0x0}, 0x0}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x7, 0x0) io_setup(0x0, 0x0) io_setup(0x0, 0x0) io_setup(0x8, &(0x7f0000000100)) io_setup(0x0, 0x0) io_destroy(0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x8026, 0x5, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000080)) close(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getresuid(&(0x7f0000000440), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) 20:55:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000040)={&(0x7f0000006240)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0xf, 0x600}]]}}}]}, 0x3c}}, 0x0) 20:55:36 executing program 2: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000100)="2600000022004701050000000000000005006d20002b1f00c05d080a4a71f10101c7033400b0", 0x26) connect$netlink(r0, &(0x7f0000e8f000)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000001280), 0x4) sendto(r0, &(0x7f0000000080), 0x16, 0x0, 0x0, 0xfd92) read(r0, &(0x7f0000000040)=""/117, 0x75) 20:55:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000340)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4ad43a153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000005740)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, &(0x7f00000007c0)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000005880)={0x0, 0x1c9c380}) [ 1162.277941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3677 comm=syz-executor2 20:55:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x71e4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000001}) mremap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 20:55:37 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@remote, @remote, @ipv4={[], [], @local}, 0xe, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 20:55:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x11, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) [ 1162.634100] netlink: 'syz-executor5': attribute type 15 has an invalid length. 20:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000280)="153f6234488dd25d766070") setgroups(0x2, &(0x7f00000000c0)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000000480)=[0x0, 0x0]) 20:55:38 executing program 3: r0 = socket(0x100000010, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@setneightbl={0x18, 0x43, 0x101, 0x0, 0x0, {}, [@NDTA_NAME={0x4}]}, 0x18}}, 0x0) 20:55:38 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000380)="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", 0xfc) 20:55:38 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}, 0x7}], 0x2, 0x0) [ 1163.828523] kauditd_printk_skb: 172 callbacks suppressed [ 1163.828548] audit: type=1400 audit(1542920139.358:6575): avc: denied { map } for pid=3704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1163.944783] audit: type=1400 audit(1542920139.408:6576): avc: denied { map } for pid=3704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1164.063005] audit: type=1400 audit(1542920139.418:6577): avc: denied { map } for pid=3704 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000180)={0x5, 0x40, 0x122, 0x100}) r5 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)="628671435790a82a4ddb5fbb0bdf62a709916f146370a6ecc13cee67a93d6a0f5226c536dde403337d95294394a86faaff37c03561727dd124418ea0057e50b69a58d9125237f582eade7b0f7f5293cc7ac2eedf8c33a20816dd6309bf52555e4bcc5d7ee4475e68799dcbde9a989f32e22b3b36e5f82fd8006f29abc6a72b019b85fd1fb9851693a92f9a71eade33b40a9fb0b5d93d895e1ae182b7c5b76da18a1ef4db2236bacd56e5772ae4cecc507614dc8a92c599fee07f70681decac9ba6a55bd0905b7cedd9ab3f9d", 0xcc}], 0x1, &(0x7f0000000740), 0x0, 0x10}, 0x4000010) getsockopt$XDP_STATISTICS(r5, 0x11b, 0x7, &(0x7f0000000440), &(0x7f00000005c0)=0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x500, 0x0) r6 = gettid() getgid() writev(r0, &(0x7f0000000500)=[{&(0x7f0000000480)="2b1cbccc40004dd548226dbf7865af0dc9725484e5699dfe9f02d29fd620910b60499e1aaf7d636cf32399ed1ff8ec7e26c97b9f42be07a0eb907d11cdb44393ae5f3fa533acef1f26301abd3d0fdf80fe8018bbf20ac026656b471e3e887124d3b9c9", 0x63}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, &(0x7f0000000000)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)=r6) sendmsg$alg(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001900)="591dfdef4e36437bcc2fe7624547b950b975cc0c815d26aef4f008c6923c210f560546d90815f7caaf08226f44c7de94fcae5051073d0cc8e3150754f5b68720861bd8cc72551ce6bf973bab472df4a4b9a15c1e2d78f104680e9edd3354a8c114e77587a3b3aa6f15e24b6ae54f757c6a8826cd78efb859ee617907f9de5f5e7284d0", 0x83}], 0x1, &(0x7f0000000440), 0x0, 0x4000}, 0x40000) tkill(r6, 0x1004000000016) fgetxattr(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="737973ffffff7f000000007972696e67007ce77cd3dcec7ecec5bf43812f8957f1628a41e20e75764ea830"], &(0x7f0000000300)=""/127, 0x7f) close(r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000600)=0xc) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x7, 0x2, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x1, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x800, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x2, 0x2}]}) dup3(r2, r1, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r7) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) 20:55:39 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000200)="e0", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 20:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = memfd_create(&(0x7f0000000180)="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", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000040), 0xfffb) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) dup3(r1, r2, 0x0) shutdown(r1, 0x1) 20:55:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300600, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x3b, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 20:55:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, 0x0, 0x0) [ 1164.247206] audit: type=1400 audit(1542920139.428:6578): avc: denied { map } for pid=3704 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1164.391200] audit: type=1400 audit(1542920139.458:6579): avc: denied { map } for pid=3704 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1164.528632] audit: type=1400 audit(1542920139.498:6580): avc: denied { map } for pid=3692 comm="syz-executor4" path="/root/syzkaller-testdir989809310/syzkaller.uQQDGn/198/bus" dev="sda1" ino=16666 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 20:55:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x71e4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000001}) mremap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 20:55:40 executing program 5: r0 = socket$inet(0x10, 0x400000200000003, 0x6) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000000)="1b0000001200030207fffd946fa28308070019006c000000000085", 0x1b}], 0x1}, 0x0) [ 1164.742667] audit: type=1400 audit(1542920139.508:6581): avc: denied { map } for pid=3704 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:40 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x2, 0x0) write$P9_RCLUNK(r0, 0x0, 0x3a0) [ 1164.882573] audit: type=1400 audit(1542920139.548:6582): avc: denied { map } for pid=3704 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1164.979780] audit: type=1400 audit(1542920139.568:6583): avc: denied { map } for pid=3704 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, 0x0, 0x0) 20:55:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300600, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x3b, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 1165.212767] audit: type=1400 audit(1542920139.628:6584): avc: denied { map } for pid=3704 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 20:55:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') open(&(0x7f00000002c0)='./file0\x00', 0x800, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r2, &(0x7f0000000c00)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x3f}, 0xc, &(0x7f0000000480)={&(0x7f0000000c80)=ANY=[]}, 0x1, 0x0, 0x0, 0x80000020000011}, 0xfffffffffffffffd) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x5, &(0x7f0000000d00)) sendto$inet(r3, &(0x7f0000000000), 0xdc775c1d96975d92, 0xc0, &(0x7f00000000c0), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x1, &(0x7f0000000080), 0x1d0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000100)=0xffffffd, 0x4007ffffffb) 20:55:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000180)={0x5, 0x40, 0x122, 0x100}) r5 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)="628671435790a82a4ddb5fbb0bdf62a709916f146370a6ecc13cee67a93d6a0f5226c536dde403337d95294394a86faaff37c03561727dd124418ea0057e50b69a58d9125237f582eade7b0f7f5293cc7ac2eedf8c33a20816dd6309bf52555e4bcc5d7ee4475e68799dcbde9a989f32e22b3b36e5f82fd8006f29abc6a72b019b85fd1fb9851693a92f9a71eade33b40a9fb0b5d93d895e1ae182b7c5b76da18a1ef4db2236bacd56e5772ae4cecc507614dc8a92c599fee07f70681decac9ba6a55bd0905b7cedd9ab3f9d", 0xcc}], 0x1, &(0x7f0000000740), 0x0, 0x10}, 0x4000010) getsockopt$XDP_STATISTICS(r5, 0x11b, 0x7, &(0x7f0000000440), &(0x7f00000005c0)=0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x500, 0x0) r6 = gettid() getgid() writev(r0, &(0x7f0000000500)=[{&(0x7f0000000480)="2b1cbccc40004dd548226dbf7865af0dc9725484e5699dfe9f02d29fd620910b60499e1aaf7d636cf32399ed1ff8ec7e26c97b9f42be07a0eb907d11cdb44393ae5f3fa533acef1f26301abd3d0fdf80fe8018bbf20ac026656b471e3e887124d3b9c9", 0x63}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, &(0x7f0000000000)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)=r6) sendmsg$alg(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001900)="591dfdef4e36437bcc2fe7624547b950b975cc0c815d26aef4f008c6923c210f560546d90815f7caaf08226f44c7de94fcae5051073d0cc8e3150754f5b68720861bd8cc72551ce6bf973bab472df4a4b9a15c1e2d78f104680e9edd3354a8c114e77587a3b3aa6f15e24b6ae54f757c6a8826cd78efb859ee617907f9de5f5e7284d0", 0x83}], 0x1, &(0x7f0000000440), 0x0, 0x4000}, 0x40000) tkill(r6, 0x1004000000016) fgetxattr(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="737973ffffff7f000000007972696e67007ce77cd3dcec7ecec5bf43812f8957f1628a41e20e75764ea830"], &(0x7f0000000300)=""/127, 0x7f) close(r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000600)=0xc) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x7, 0x2, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x1, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x800, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x2, 0x2}]}) dup3(r2, r1, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r7) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) 20:55:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300600, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x3b, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 20:55:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, 0x0, 0x0) 20:55:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x71e4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000001}) mremap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 20:55:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300600, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x3b, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 20:55:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, 0x0, 0x0) 20:55:42 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) exit(0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000840), 0x31e, &(0x7f0000000700)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000440)) 20:55:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x18, 0x2, [@IFLA_GRE_REMOTE={0x4, 0x7, @loopback}]}}}]}, 0x4c}}, 0x0) 20:55:43 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x100000, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x0, 0x4}}, 0x20) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000c2581fcf"], 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000280), 0xd1) 20:55:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000180)={0x5, 0x40, 0x122, 0x100}) r5 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)="628671435790a82a4ddb5fbb0bdf62a709916f146370a6ecc13cee67a93d6a0f5226c536dde403337d95294394a86faaff37c03561727dd124418ea0057e50b69a58d9125237f582eade7b0f7f5293cc7ac2eedf8c33a20816dd6309bf52555e4bcc5d7ee4475e68799dcbde9a989f32e22b3b36e5f82fd8006f29abc6a72b019b85fd1fb9851693a92f9a71eade33b40a9fb0b5d93d895e1ae182b7c5b76da18a1ef4db2236bacd56e5772ae4cecc507614dc8a92c599fee07f70681decac9ba6a55bd0905b7cedd9ab3f9d", 0xcc}], 0x1, &(0x7f0000000740), 0x0, 0x10}, 0x4000010) getsockopt$XDP_STATISTICS(r5, 0x11b, 0x7, &(0x7f0000000440), &(0x7f00000005c0)=0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x500, 0x0) r6 = gettid() getgid() writev(r0, &(0x7f0000000500)=[{&(0x7f0000000480)="2b1cbccc40004dd548226dbf7865af0dc9725484e5699dfe9f02d29fd620910b60499e1aaf7d636cf32399ed1ff8ec7e26c97b9f42be07a0eb907d11cdb44393ae5f3fa533acef1f26301abd3d0fdf80fe8018bbf20ac026656b471e3e887124d3b9c9", 0x63}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, &(0x7f0000000000)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)=r6) sendmsg$alg(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001900)="591dfdef4e36437bcc2fe7624547b950b975cc0c815d26aef4f008c6923c210f560546d90815f7caaf08226f44c7de94fcae5051073d0cc8e3150754f5b68720861bd8cc72551ce6bf973bab472df4a4b9a15c1e2d78f104680e9edd3354a8c114e77587a3b3aa6f15e24b6ae54f757c6a8826cd78efb859ee617907f9de5f5e7284d0", 0x83}], 0x1, &(0x7f0000000440), 0x0, 0x4000}, 0x40000) tkill(r6, 0x1004000000016) fgetxattr(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="737973ffffff7f000000007972696e67007ce77cd3dcec7ecec5bf43812f8957f1628a41e20e75764ea830"], &(0x7f0000000300)=""/127, 0x7f) close(r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000600)=0xc) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x7, 0x2, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x1, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x800, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x2, 0x2}]}) dup3(r2, r1, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r7) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) 20:55:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 20:55:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x71e4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000001}) mremap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 20:55:44 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) sendmmsg(r0, &(0x7f000000d180), 0x255, 0x0) 20:55:44 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000180)=""/27) r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000004c0)='./file0\x00', 0x40200, 0x11) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000180)={0x5, 0x0, 0x3, 0xfffffffffffffffc, '\x00', 0x1}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000680)={'filter\x00', 0x4}, 0x68) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000003300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x106, 0x9}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x3ff, 0x82) r5 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) socket(0x2, 0x2, 0x8) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300)="7dd76e437497d4e876da61e0d7b937868f1217440083b8595acf", 0x1a, 0xfffffffffffffffb) sendmmsg$unix(r3, &(0x7f00000031c0)=[{&(0x7f0000003080)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000003100), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="00f6ff009a8322d86b8b69369d47642716ebb2f50ce3deedd86153bc31f40f2cb216128a590da672002c477cf0301da136386096889f989d4c8e358947c8655619ed6928121485a83564119d76ebdafaa5f4a2b91eb7f3b08f80e247ad4a33f79f39a0cbd47c54aa9abd804d2f22141f7eb6bc3de6eb6408c65f8427afa702b3639d0000000000"], 0x87, 0x8001}], 0x1, 0x0) memfd_create(&(0x7f0000000400)='eth1\x00', 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0xedcf9e9db1f3ef3a) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) ioctl$KVM_SMI(r5, 0xaeb7) 20:55:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000000080)=""/166, &(0x7f0000000040)=0xffffffffffffffbb) [ 1169.184474] kauditd_printk_skb: 149 callbacks suppressed [ 1169.184489] audit: type=1400 audit(1542920144.718:6734): avc: denied { map } for pid=3794 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1169.324182] audit: type=1400 audit(1542920144.718:6735): avc: denied { map } for pid=3794 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_stats={0x1d, 0x1, [0xa0]}}) listen(r0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000200)) r1 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in6, 0x0, 0x8, 0x0, "0828bc4ca1b6eef465a075fdd7ddf68ebdb57c5ae00357dab13ead7859aad765382cf6d6af57ebf01ba55ef8b22760b5580ae1841e81cf901598ccdaba6651d293773faac64c8be67ae85cab7f663b07"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6, 0x0, 0x0, 0x0, "4e1d25e9968f1f2621094b56a722d6cf8c5b50f5db481f2e147fb8b08220d9574c4a7a1a9205df0dd7e13aae6563f078b9b042b45088a329079f5da9bdb0d8c717ec67c84ff98c9d6261f766e9f61d69"}, 0xd8) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 1169.452487] audit: type=1400 audit(1542920144.718:6736): avc: denied { map } for pid=3794 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:45 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00007dc000)='./file0\x00', 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x103000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0xffffffffffffff9c}, 0x10) dup2(r2, r2) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000002}) finit_module(r1, &(0x7f0000000300)="6d696d655f747970652976626f786e6574312c2474727573746564ee2c766d6e6574316b657972696e672e706f7369785f61636c5f61636365737300", 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000280)={0x8, 0xffffffffffffffee, 0x4, 0x9, 0xcf, 0x26, 0x81, 0x1000, 0xb3, 0x9, 0x1, 0x6}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="2c00cb0aa40b7dc8929f0de6c8a5fc0166cc02a23d0bb6b6ea89b2ba23a319979bba9c8460614008aa5e57c7bcada5682477d9b3156f6723a7fb1fa83958d4e77cfb65d295989e55eaa93e721707c9463bab0322744b95f466267c1be64fef2e005016034df130cea61eb4bce65b9cf2359375dca7916c55a7a8eaed8546954f53e02d4922ec"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3f, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf, 0x4, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r4 = gettid() getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000240)=0x401, &(0x7f0000000500)=0x2) syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0xffffffffffffffff, 0x40) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000440)={'NETMAP\x00'}, &(0x7f0000000540)=0x1e) tkill(r4, 0x1000000000016) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r5, &(0x7f00000004c0)={0x1a, 0x337, 0x48, 0x4, 0x3, 0x7f, @dev={[], 0x15}}, 0x10) 20:55:45 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0xc020660b) [ 1169.597564] audit: type=1400 audit(1542920144.718:6737): avc: denied { map } for pid=3794 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 1169.741041] audit: type=1400 audit(1542920144.818:6738): avc: denied { map } for pid=3794 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1169.892294] audit: type=1400 audit(1542920144.848:6739): avc: denied { map } for pid=3794 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1170.133309] audit: type=1400 audit(1542920144.878:6740): avc: denied { map } for pid=3794 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1170.285876] audit: type=1400 audit(1542920144.918:6741): avc: denied { map } for pid=3802 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:45 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x4e24, @multicast1}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x1, 0x81, &(0x7f0000000080)='syzkaller1\x00', 0x6, 0x0, 0x7fff}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x40000100, 0x0, 0x40000083], [0xc1]}) 20:55:45 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:00,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 1170.418230] audit: type=1400 audit(1542920144.918:6743): avc: denied { map } for pid=3794 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x3f, 0x1, 0x0, 0x4, 0xc00, 0x0, 0x7}, 0x20) 20:55:46 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000004ffc)=0x220) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, r1+30000000}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1170.547198] audit: type=1400 audit(1542920144.918:6742): avc: denied { map } for pid=3793 comm="syz-executor4" path="/root/syzkaller-testdir989809310/syzkaller.uQQDGn/201/bus" dev="sda1" ino=17249 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 20:55:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) openat$cgroup_ro(r0, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="00696f201c61c059fc896f675b11d6b2966bf3d645e1192ea1e723fbaeae209e5f0362f95a5bca67a7bc7c2ec1e1249876b92141b540000000000000003311e7a315662a66140e24997ccaebedde449f6e58cb4ee7e7000000000000bbf3e69087db6d4bb133e76d5cce50ecc695d431a98115c8a1ecf642d99c8cd7fcef7ef89ad02e0db92b009c25e3c580795358529442794da98757f558376584570a89bad69d9dd37460f88e28dcc5bb55fbd3256e41cfbf3e38ea1e052c98b312b7f2f1dad402548b9f7b7b751e"], 0xca) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[], 0x20a) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)='selinux\x00'}, 0x30) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'rdma'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}]}, 0x11) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000005c0)=""/165) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000002c0)=0xffffffffffff8000) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000003c0)) socket$kcm(0x29, 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)) 20:55:46 executing program 3: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80005, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x5, @local, 0x2000000004}, 0xfffffffffffffe98) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000004c0)="6e30feffd12e312ca85dcb6b00") r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000540)=0x1, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000440)={@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xd}, 0x20) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x400000) ioctl$SCSI_IOCTL_START_UNIT(r5, 0x5) fcntl$getownex(r1, 0x10, &(0x7f0000000380)={0x0, 0x0}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000240)="79616d30030300") signalfd(r2, &(0x7f0000000200)={0x1f}, 0x8) getsockname(r1, &(0x7f0000002840)=@hci={0x1f, 0x0}, &(0x7f00000000c0)=0x80) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x20, 0x8, 0x6c4e, 0x3, 0x0, 0x6, 0x2, 0x0, 0x56, 0x0, 0x7fff, 0x6, 0x800, 0x1ff, 0x0, 0x1, 0x4, 0x9, 0x3662, 0x2, 0xa44, 0xa86, 0x8, 0x1, 0x7, 0xed, 0x7ff, 0x7, 0xd540, 0xffffffffffffe169, 0x96a, 0x1, 0xa432, 0x2, 0x20, 0x8, 0x0, 0x401, 0x1, @perf_config_ext={0x74f, 0xfffffffffffffffd}, 0x0, 0x2, 0x2, 0x0, 0x0, 0x2, 0x6}, r6, 0x7, r0, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r5, 0x28, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) write$P9_RLERRORu(r5, &(0x7f0000000480)={0x1b, 0x7, 0x2, {{0xe, 'nodevvboxnet1/'}, 0x6}}, 0x1b) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r8, 0x0, 0x8}, 0xc) sendmmsg(r1, &(0x7f0000005900)=[{{&(0x7f0000004400)=@xdp={0x2c, 0x4, r7, 0x2f}, 0x80, &(0x7f0000005480)=[{&(0x7f0000004480)="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", 0x1000}], 0x1, &(0x7f00000054c0), 0x0, 0x24000010}, 0x5}], 0x1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)="727872b37500", &(0x7f0000000040)="060000006320") [ 1171.313084] libceph: parse_ips bad ip '[d::]:00,[' [ 1171.352286] libceph: parse_ips bad ip '[d::]:00,[' 20:55:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 20:55:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff85, 0x10, 0x0, 0xffffffffa0008000}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 20:55:46 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x200000000000001) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000100)) 20:55:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mmap$perf(&(0x7f0000105000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001680)) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fstat(0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4000) pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 20:55:47 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000004ffc)=0x220) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, r1+30000000}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 20:55:47 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)=0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xfffffffffffffffd, &(0x7f00000005c0)=0x8000000400000201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast1}, 0xffffffffffffff77) listen(r2, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x20, 0x0) r4 = dup2(r1, r2) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000340)={0x10000010001, 0x37c, 0x4, 0x40000008, 0x7fff, 0x0, 0x7, 0x80000000000, 0x37, 0x4, 0x3ff, 0x7}) poll(&(0x7f00000000c0)=[{r3, 0x43}, {r2, 0x20}, {r1, 0x2000}, {r3, 0x40}], 0x4, 0x77d) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x7b35f44f63a59b09) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x7fd, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000580)) getpgrp(r5) r8 = getpgrp(r6) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f00000001c0)={0x4, 0x2, 0x3, 0x0, 'syz1\x00', 0x8}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000600)={{0x6000000, 0x0, 0x0, 0x0, 'syz0\x00', 0x81e}, 0x3, 0x0, 0x5, r8, 0x1, 0x101, 'syz0\x00', &(0x7f0000000000)=["4c65746831813d2900"], 0x9, [], [0x5]}) 20:55:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x600, 0x0, r2, 0x93e, 0x16c6}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 20:55:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x18, 0x0, 0xffffff03, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 20:55:48 executing program 5: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f2010007000c000000030000000c", 0x11, 0x1400}], 0x0, 0x0) 20:55:48 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r0, 0x0, &(0x7f0000000080)) sendto$unix(r1, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)=@abs, 0x6e) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002680)=ANY=[]}}, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 20:55:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 1173.085194] bridge_slave_1: FDB only supports static addresses 20:55:48 executing program 2: perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3181}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:55:48 executing program 0: r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000940)=ANY=[], &(0x7f0000000480)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000788000), 0x4) setsockopt(0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000700)="b379bdcb12034119424b34f87d72e1ff6d9b34bcb3aee8817d5b04cad1332c2de1412395cb0eb81c1c503ba4fca45f58196bf018930095279350b73dc9b779fa9fc6957760370c92c87f54b16632fd4865d5f02853a0cb14879d00000000000000", 0x61) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000004c0)='./file0\x00', 0x40200, 0x11) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000180)={0x5, 0x0, 0x3, 0xfffffffffffffffc, '\x00', 0x1}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000680)={'filter\x00', 0x4}, 0x68) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000003300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x106, 0x9}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) fcntl$addseals(r2, 0x409, 0xe) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x3ff, 0x82) r5 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'irlan0\x00'}) socket(0x2, 0x2, 0x8) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300)="7dd76e437497d4e876da61e0d7b937868f1217440083b8595acf", 0x1a, 0xfffffffffffffffb) sendmmsg$unix(r3, &(0x7f00000031c0)=[{&(0x7f0000003080)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000003100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4, 0x8001}], 0x1, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000540)=0x10, 0x4) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) 20:55:49 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000004ffc)=0x220) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, r1+30000000}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 20:55:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) [ 1173.787546] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1173.802671] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1173.844821] F2FS-fs (loop5): Invalid log blocks per segment (0) [ 1173.844821] 20:55:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r1 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa, 0x70}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000bf7000/0x1000)=nil, 0x1000}, 0x1}) r3 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000bc8000)={0xaa, 0x70}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f000034d000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(r3, r4) dup2(r1, r2) [ 1173.893399] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1173.926582] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1173.995755] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1174.042792] F2FS-fs (loop5): Invalid log blocks per segment (0) [ 1174.042792] [ 1174.089356] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1174.193782] kauditd_printk_skb: 156 callbacks suppressed [ 1174.193797] audit: type=1400 audit(1542920149.728:6900): avc: denied { map } for pid=3883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1174.378244] audit: type=1400 audit(1542920149.728:6901): avc: denied { map } for pid=3883 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1174.409221] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1174.422676] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1174.445151] F2FS-fs (loop5): Invalid log blocks per segment (0) [ 1174.445151] [ 1174.497251] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1174.545644] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1174.574507] audit: type=1400 audit(1542920149.728:6902): avc: denied { map } for pid=3883 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:50 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x2000000000002) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4) ioctl$UFFDIO_COPY(r0, 0xc028aa03, 0x0) [ 1174.622744] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1174.669500] F2FS-fs (loop5): Invalid log blocks per segment (0) [ 1174.669500] [ 1174.712640] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1174.780109] audit: type=1400 audit(1542920149.728:6903): avc: denied { map } for pid=3877 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xf0ffff, 0xffffff9e}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 20:55:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1174.933886] audit: type=1400 audit(1542920149.728:6904): avc: denied { map } for pid=3877 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:50 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000004ffc)=0x220) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, r1+30000000}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1175.138788] audit: type=1400 audit(1542920149.728:6905): avc: denied { map } for pid=3876 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:50 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x5) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x123}) 20:55:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161180000000000616200000000000085100000010000009500000000000000bf100000000000003c200000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0x50, &(0x7f00000001c0)}, 0x10) [ 1175.259717] audit: type=1400 audit(1542920149.808:6906): avc: denied { map } for pid=3883 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1175.392717] audit: type=1400 audit(1542920149.858:6907): avc: denied { map } for pid=3885 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1175.504611] audit: type=1400 audit(1542920149.858:6908): avc: denied { map } for pid=3885 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:51 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) stat(&(0x7f00000001c0)='./file0\x00', 0x0) getegid() getresgid(&(0x7f0000000500), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) getgroups(0x4, &(0x7f0000000700)=[0xee00, 0xee01, 0xee00, 0xee01]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) fstat(r0, &(0x7f0000000940)) setgroups(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0000934dc69ae626684a64beb9a782dd6e961179055d070000", 0x19) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x480000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000540)="66660f3882811344bd85b87f7800000f23c80f21f8350000f0000f23f866ba2100b0faee0f01f70f20c035040000000f22c0360f00d6660f3801a7627a33460f234cb83e0000000f23d00f21f835100000020f23f866baa10066ed", 0x5b}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000280)) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f00000000c0)="2e2e640fc7a80900fdb8e8038ee0f2e053baf80c66b820bbcb8866efbafc0c66b80000000066ef0f95610166b8150000000f23c80f21f86635000040000f23f8b800008ee8640f9a8803003d0000", 0x4e}], 0x129, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1175.637004] audit: type=1400 audit(1542920149.898:6909): avc: denied { map } for pid=3883 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:55:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) capset(0x0, 0x0) 20:55:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x4000000000000005) r4 = dup3(r3, r0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffff}) write(r4, &(0x7f0000000140)='.', 0x1) [ 1176.174617] vhci_hcd: invalid port number 0 20:55:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x24}}, &(0x7f0000000240)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) fcntl$setsig(r1, 0x8, 0x0) 20:55:51 executing program 5: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 20:55:52 executing program 3: eventfd2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 20:55:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x303, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000140)) mount(&(0x7f0000000d40)=ANY=[@ANYBLOB="eb211b0ef5df1b0a7eadeab0c375a3a40e25becc9ec416499d8b4e102990454cc6b61826eeb2a4055c208a803e9c8e8bf7ff0091212e4d9e4c25acf6de1e78825db21649beee91a9d1da4e1aa55dbe47c9412195d377a170c16d7d850000cf75f43ce3f1d70b9d7baa8f2467e8609efe14e3ff387733d1193d4cb8fa7d482f01e622d3623ab5cfe1f830ad600a7510b690426141f8d92d0d51745903c515374b1f26454558028ff8c07028d9bb64a78447e7b4cab96e224666e5c8a634a91f2ef0ca27d5f7004971bcc7bb816deb5f4715b884559273470e037a30f80f4e18cc10507afa3c2ee8172c72c2d60479c66d36"], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="3897c61e2344b35ce4b0e8eb675766d6275488bb0fb34f52ffa1089abf3a2ddadfc651515d2fef6de3890668ac6d16dcf001c0c3704e9f3f984b6b7b1039cfd93e445671550a8131d137"], &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000f80)=ANY=[@ANYBLOB="d38531caa4156625663c0f089d9fef43b13e5f47213770afc07814155364b8ff9c0aac61f8a727c76fc1d33183f71d6804e8a1641c1e2c64e93285fb08610d354ee964d87459fc96dff4e3330934296d7b1f12022f69c9e110691afdc14b92a1b4d83cf39521df74c14ef6ee61666d1d23628c9e6aca622050d1b3d130d00000"], &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) mount(&(0x7f00000010c0)=ANY=[@ANYRES16=r2, @ANYRESHEX=r3], &(0x7f0000001000)='./file0\x00', &(0x7f0000001040)='devpts\x00', 0x800000, &(0x7f0000001080)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000ec0)=ANY=[@ANYBLOB="41d5e5aff989777a8615eda28b42a691b41227087783cc4a0a8a160ab4ac0a70beccc2d6127518424926160c6694f1e1408ed92963f702c7f56e1854563810908753925c3b3842d898610ae74ff9e951a1436611aad7a168e10224eeb92488347cf2b32702f4b0ddd2377d1f5180de464ee7c71a8b152b26f9cad69dc44c4f62d2304f8a"], &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) utimes(&(0x7f0000001080)='./file0\x00', &(0x7f0000000e40)={{0x0, 0x7530}, {0x0, 0x7530}}) close(r1) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") [ 1176.987562] ================================================================== [ 1176.995292] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 1177.001797] Read of size 8 at addr ffff8881c16b7ae0 by task syz-executor2/3931 [ 1177.009155] [ 1177.010793] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.018082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.027899] Call Trace: [ 1177.030516] dump_stack+0x244/0x39d [ 1177.034162] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1177.039384] ? printk+0xa7/0xcf [ 1177.042669] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1177.047444] print_address_description.cold.7+0x9/0x1ff [ 1177.052826] kasan_report.cold.8+0x242/0x309 [ 1177.057242] ? __list_add_valid+0x8f/0xac [ 1177.061405] __asan_report_load8_noabort+0x14/0x20 [ 1177.066350] __list_add_valid+0x8f/0xac [ 1177.070400] bpf_prog_kallsyms_add+0x200/0x9b0 [ 1177.075049] ? alloc_file+0x4d0/0x4d0 [ 1177.078868] ? bpf_patch_insn_single+0x2c0/0x2c0 [ 1177.083646] ? get_unused_fd_flags+0x122/0x1a0 [ 1177.088251] ? fd_install+0x4d/0x60 [ 1177.091934] ? anon_inode_getfd+0x81/0xb0 [ 1177.096129] bpf_prog_load+0x13dc/0x1cc0 [ 1177.100208] ? bpf_prog_new_fd+0x60/0x60 [ 1177.104331] ? __might_fault+0x12b/0x1e0 [ 1177.108425] ? lock_downgrade+0x900/0x900 [ 1177.112604] ? perf_trace_sched_process_exec+0x860/0x860 [ 1177.118079] ? usercopy_warn+0x110/0x110 [ 1177.122183] ? selinux_bpf+0xe6/0x130 [ 1177.125992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1177.132050] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1177.139149] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1177.146116] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1177.150616] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.157989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.167371] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1177.172819] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1177.191715] RSP: 0018:ffff8881828a7590 EFLAGS: 00010046 [ 1177.197077] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1177.204349] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1177.211622] RBP: ffff8881828a7708 R08: ffff88818144e4c0 R09: ffffed103b5c5b67 [ 1177.218925] R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: 1ffff11030514ed4 [ 1177.226196] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1177.233483] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1177.241712] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1177.247593] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1177.254870] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1177.262143] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1177.269425] Call Trace: [ 1177.272053] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1177.279150] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1177.286097] Oops: 0000 [#2] PREEMPT SMP KASAN [ 1177.290599] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.297870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.307238] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1177.312693] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1177.331594] RSP: 0018:ffff8881828a6ea8 EFLAGS: 00010046 [ 1177.336967] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1177.344253] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1177.351521] RBP: ffff8881828a7020 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1177.358800] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514df7 [ 1177.366071] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1177.373346] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1177.381571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1177.387446] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1177.394724] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1177.402042] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1177.409333] Call Trace: [ 1177.411947] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1177.419101] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1177.426088] Oops: 0000 [#3] PREEMPT SMP KASAN [ 1177.430624] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.437938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.447333] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1177.452804] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1177.471707] RSP: 0018:ffff8881828a67b8 EFLAGS: 00010046 [ 1177.477069] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1177.484352] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1177.491619] RBP: ffff8881828a6930 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1177.498888] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514d19 [ 1177.506152] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1177.513415] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1177.521656] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1177.527534] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1177.534808] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1177.542086] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1177.549346] Call Trace: [ 1177.551945] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1177.559049] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1177.565988] Oops: 0000 [#4] PREEMPT SMP KASAN [ 1177.570481] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.577745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.587110] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1177.592559] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1177.611462] RSP: 0018:ffff8881828a60c8 EFLAGS: 00010046 [ 1177.616821] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1177.624107] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1177.631388] RBP: ffff8881828a6240 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1177.638698] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514c3b [ 1177.645967] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1177.653232] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1177.661468] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1177.667393] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1177.674664] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1177.681942] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1177.689207] Call Trace: [ 1177.691814] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1177.698908] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1177.705841] Oops: 0000 [#5] PREEMPT SMP KASAN [ 1177.710336] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.717607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.726972] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1177.732425] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1177.751326] RSP: 0018:ffff8881828a59d8 EFLAGS: 00010046 [ 1177.756688] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1177.763957] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1177.771225] RBP: ffff8881828a5b50 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1177.778489] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514b5d [ 1177.785758] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1177.793041] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1177.801265] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1177.807142] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1177.814412] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1177.821696] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1177.828960] Call Trace: [ 1177.831568] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1177.838661] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1177.845606] Oops: 0000 [#6] PREEMPT SMP KASAN [ 1177.850132] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.857410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.866812] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1177.872348] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1177.891252] RSP: 0018:ffff8881828a52e8 EFLAGS: 00010046 [ 1177.896628] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1177.903895] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1177.911174] RBP: ffff8881828a5460 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1177.918443] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514a7f [ 1177.925712] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1177.932979] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1177.941205] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1177.947081] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1177.954352] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1177.961631] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1177.968897] Call Trace: [ 1177.971509] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1177.978613] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1177.985570] Oops: 0000 [#7] PREEMPT SMP KASAN [ 1177.990075] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1177.997343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.006706] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.012153] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1178.031540] RSP: 0018:ffff8881828a4bf8 EFLAGS: 00010046 [ 1178.036898] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1178.044171] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1178.051447] RBP: ffff8881828a4d70 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1178.058716] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff110305149a1 [ 1178.065984] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1178.073256] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1178.081480] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1178.087362] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1178.094631] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1178.101925] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1178.109217] Call Trace: [ 1178.111826] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1178.118918] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1178.125882] Oops: 0000 [#8] PREEMPT SMP KASAN [ 1178.130392] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1178.137670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.147051] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.152505] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1178.171434] RSP: 0018:ffff8881828a4508 EFLAGS: 00010046 [ 1178.176796] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1178.184067] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 20:55:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1}}, 0x1c}}, 0x0) [ 1178.191332] RBP: ffff8881828a4680 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1178.198690] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff110305148c3 [ 1178.205956] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1178.213221] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1178.221435] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1178.227315] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1178.234574] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1178.241836] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1178.249097] Call Trace: [ 1178.251690] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1178.258770] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1178.265686] Oops: 0000 [#9] PREEMPT SMP KASAN [ 1178.270165] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1178.277416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.286759] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.292188] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1178.311076] RSP: 0018:ffff8881828a3e18 EFLAGS: 00010046 [ 1178.316424] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1178.323677] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1178.330935] RBP: ffff8881828a3f90 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1178.338211] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff110305147e5 [ 1178.345487] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1178.352751] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1178.360957] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1178.366828] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1178.374094] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1178.381349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1178.388610] Call Trace: [ 1178.391234] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1178.398314] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1178.405230] Oops: 0000 [#10] PREEMPT SMP KASAN [ 1178.409798] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1178.417068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.426422] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.431852] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1178.450734] RSP: 0018:ffff8881828a3728 EFLAGS: 00010046 [ 1178.456082] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1178.463349] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1178.470597] RBP: ffff8881828a38a0 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1178.477849] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514707 [ 1178.485115] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1178.492368] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1178.500581] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1178.506445] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1178.513695] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1178.520955] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1178.528204] Call Trace: [ 1178.530786] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1178.537876] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1178.544786] Oops: 0000 [#11] PREEMPT SMP KASAN [ 1178.549348] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1178.556610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.565960] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.571389] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1178.590275] RSP: 0018:ffff8881828a3038 EFLAGS: 00010046 [ 1178.595622] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1178.602875] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1178.610127] RBP: ffff8881828a31b0 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1178.617392] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514629 [ 1178.624643] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1178.631897] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1178.640102] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1178.645964] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1178.653216] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1178.660466] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1178.667722] Call Trace: [ 1178.670301] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1178.677379] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1178.684323] Oops: 0000 [#12] PREEMPT SMP KASAN [ 1178.688906] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1178.696171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.705508] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.710938] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1178.729819] RSP: 0018:ffff8881828a2948 EFLAGS: 00010046 [ 1178.735160] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1178.742426] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1178.749692] RBP: ffff8881828a2ac0 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1178.756942] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff1103051454b [ 1178.764192] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1178.771464] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1178.779699] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1178.785559] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1178.792811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1178.800064] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1178.807313] Call Trace: [ 1178.809931] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1178.817014] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1178.823982] Oops: 0000 [#13] PREEMPT SMP KASAN [ 1178.828549] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1178.835829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.845177] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.850625] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1178.869514] RSP: 0018:ffff8881828a2258 EFLAGS: 00010046 [ 1178.874869] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1178.882120] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1178.889372] RBP: ffff8881828a23d0 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1178.896626] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff1103051446d [ 1178.903879] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1178.911151] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1178.919383] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1178.925263] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1178.932516] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1178.939769] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1178.947034] Call Trace: [ 1178.949648] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1178.956723] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1178.963635] Oops: 0000 [#14] PREEMPT SMP KASAN [ 1178.968204] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1178.975468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.984808] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1178.990238] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1179.009120] RSP: 0018:ffff8881828a1b68 EFLAGS: 00010046 [ 1179.014464] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1179.021717] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1179.028965] RBP: ffff8881828a1ce0 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1179.036218] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff1103051438f [ 1179.043496] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1179.050764] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1179.058972] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.064834] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1179.072085] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1179.079347] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1179.086616] Call Trace: [ 1179.089202] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1179.096298] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1179.103209] Oops: 0000 [#15] PREEMPT SMP KASAN [ 1179.107768] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1179.115066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.124912] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1179.130373] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1179.149257] RSP: 0018:ffff8881828a1478 EFLAGS: 00010046 [ 1179.154599] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1179.161851] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1179.169107] RBP: ffff8881828a15f0 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1179.176365] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff110305142b1 [ 1179.183612] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1179.190873] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1179.199083] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.204943] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1179.212204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1179.219470] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1179.226722] Call Trace: [ 1179.229304] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1179.236381] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1179.243292] Thread overran stack, or stack corrupted [ 1179.248376] Oops: 0000 [#16] PREEMPT SMP KASAN [ 1179.252950] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1179.260223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.269607] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1179.275051] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1179.293937] RSP: 0018:ffff8881828a0d88 EFLAGS: 00010046 [ 1179.299304] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1179.306566] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1179.313840] RBP: ffff8881828a0f00 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1179.321106] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff110305141d3 [ 1179.328383] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1179.335647] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1179.343857] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.349790] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1179.357076] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1179.364328] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1179.371604] Call Trace: [ 1179.374179] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1179.381256] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1179.388183] Thread overran stack, or stack corrupted [ 1179.393263] Oops: 0000 [#17] PREEMPT SMP KASAN [ 1179.397825] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1179.405076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.414416] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1179.419853] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1179.438745] RSP: 0018:ffff8881828a0698 EFLAGS: 00010046 [ 1179.444113] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1179.451361] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1179.458611] RBP: ffff8881828a0810 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1179.465862] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff110305140f5 [ 1179.473110] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1179.480365] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1179.488602] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.494462] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1179.501719] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1179.508970] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1179.516228] Call Trace: [ 1179.518816] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1179.525892] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1179.532802] Thread overran stack, or stack corrupted [ 1179.537885] Oops: 0000 [#18] PREEMPT SMP KASAN [ 1179.542446] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1179.549698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.559052] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1179.564496] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1179.583387] RSP: 0018:ffff88818289ffa8 EFLAGS: 00010046 [ 1179.588728] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1179.595983] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1179.603244] RBP: ffff8881828a0120 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1179.610497] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030514017 [ 1179.617750] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1179.624998] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1179.633203] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.639067] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1179.646317] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1179.653568] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1179.660819] Call Trace: [ 1179.663417] ? lock_acquire+0x1ed/0x520 [ 1179.667380] ? __bpf_address_lookup+0x300/0x300 [ 1179.672053] ? lock_downgrade+0x900/0x900 [ 1179.676199] ? lock_release+0xa00/0xa00 [ 1179.680174] ? kasan_check_read+0x11/0x20 [ 1179.684313] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1179.689586] ? rcu_softirq_qs+0x20/0x20 [ 1179.693550] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1179.700627] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1179.707541] Thread overran stack, or stack corrupted [ 1179.712628] Oops: 0000 [#19] PREEMPT SMP KASAN [ 1179.717190] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1179.724439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.733782] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1179.739221] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1179.758114] RSP: 0018:ffff88818289f8b8 EFLAGS: 00010046 [ 1179.763461] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1179.770715] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1179.777977] RBP: ffff88818289fa30 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1179.785227] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030513f39 [ 1179.792477] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1179.799729] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1179.807935] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.813795] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1179.821076] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1179.828342] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1179.835588] Call Trace: [ 1179.838152] ? lock_acquire+0x1ed/0x520 [ 1179.842112] ? __bpf_address_lookup+0x300/0x300 [ 1179.846785] ? lock_downgrade+0x900/0x900 [ 1179.850916] ? lock_release+0xa00/0xa00 [ 1179.854896] ? kasan_check_read+0x11/0x20 [ 1179.859035] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1179.864305] ? rcu_softirq_qs+0x20/0x20 [ 1179.868288] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1179.875368] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1179.882280] Thread overran stack, or stack corrupted [ 1179.887367] Oops: 0000 [#20] PREEMPT SMP KASAN [ 1179.891933] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1179.899184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.908523] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1179.913970] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1179.932864] RSP: 0018:ffff88818289f1c8 EFLAGS: 00010046 [ 1179.938210] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1179.945471] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1179.952734] RBP: ffff88818289f340 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1179.959987] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030513e5b [ 1179.967245] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1179.974501] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1179.982725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.988587] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1179.995839] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1180.003088] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1180.010334] Call Trace: [ 1180.012916] ? lock_acquire+0x1ed/0x520 [ 1180.016873] ? __bpf_address_lookup+0x300/0x300 [ 1180.021527] ? lock_downgrade+0x900/0x900 [ 1180.025679] ? lock_release+0xa00/0xa00 [ 1180.029661] ? kasan_check_read+0x11/0x20 [ 1180.033820] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1180.039095] ? rcu_softirq_qs+0x20/0x20 [ 1180.043081] BUG: unable to handle kernel paging request at ffffc9000193d030 [ 1180.050162] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1d4360067 PTE 0 [ 1180.057075] Thread overran stack, or stack corrupted [ 1180.062166] Oops: 0000 [#21] PREEMPT SMP KASAN [ 1180.066728] CPU: 0 PID: 3931 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #125 [ 1180.073987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.083341] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1180.088774] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1180.107664] RSP: 0018:ffff88818289ead8 EFLAGS: 00010046 [ 1180.113062] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1180.120319] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1180.127585] RBP: ffff88818289ec50 R08: ffff88818144e4c0 R09: 0000000000000001 [ 1180.134834] R10: ffffed103b5c5b67 R11: ffff88818144e4c0 R12: 1ffff11030513d7d [ 1180.142083] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1180.149339] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1180.157552] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1180.163428] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1180.170683] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1180.177945] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1180.185193] Call Trace: [ 1180.187763] Modules linked in: [ 1180.190939] CR2: ffffc9000193d030 [ 1180.194370] ---[ end trace 7aaa1759f0bcf00f ]--- [ 1180.199109] RIP: 0010:bpf_prog_kallsyms_find+0x289/0x4a0 [ 1180.204546] Code: 03 42 80 3c 30 00 0f 85 b1 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 fa 48 c1 ea 03 42 80 3c 32 00 0f 85 ab 01 00 00 49 8d 7d 02 <4d> 8b 65 30 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 42 0f b6 14 32 [ 1180.223426] RSP: 0018:ffff8881828a7590 EFLAGS: 00010046 [ 1180.228771] RAX: 0000000000000000 RBX: ffff8881c16b7ab0 RCX: ffffffff818c0a21 [ 1180.236021] RDX: 1ffff92000327a06 RSI: 0000000000000008 RDI: ffffc9000193d002 [ 1180.243301] RBP: ffff8881828a7708 R08: ffff88818144e4c0 R09: ffffed103b5c5b67 [ 1180.250553] R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: 1ffff11030514ed4 [ 1180.257801] R13: ffffc9000193d000 R14: dffffc0000000000 R15: ffff8881c16b7ab0 [ 1180.265064] FS: 00007fe045e3e700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1180.273272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1180.279135] CR2: ffffc9000193d030 CR3: 00000001bf132000 CR4: 00000000001426f0 [ 1180.286412] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1180.293683] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1180.300940] Kernel panic - not syncing: Fatal exception in interrupt [ 1180.308437] Kernel Offset: disabled [ 1180.312063] Rebooting in 86400 seconds..