1327] audit: type=1400 audit(1550617163.994:29746): avc: denied { map } for pid=26633 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 851.292295] audit: type=1400 audit(1550617164.004:29747): avc: denied { map } for pid=26631 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) [ 851.465631] audit: type=1400 audit(1550617164.004:29748): avc: denied { map } for pid=26629 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 852.087021] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0xfffffcb3, &(0x7f00000002c0)=ANY=[]}, 0xffffffffffffffff) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x1, &(0x7f00000001c0), 0x0) 22:59:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) 22:59:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 852.957509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 853.295790] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:27 executing program 3: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/mnt\x00\xda\xca$0pGK\xba2\x1c%\xfa\xba\x8b\xa6f\x7f\xb8\xe7\xea\x98\xd5\xa8\xce\xd4\xd60d,\x84\xd4\xaf\x89\x94\x1b\xc5bT\xf5\xcb\xe5\xd0\xacx\x96\xbc\bxU\xf8\xb1OA&\x01\bk\x81\x96SL.\xaf\x0f\xed\x95\x86\xae\xcaC\xec&\xb7\t\x9b\xd1\xec2\xaa\xb1\xc1d\xb1\x85G\x0f\xc9\"\xff\tyT\xa0') setns(r0, 0x0) 22:59:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 22:59:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 854.179928] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a0") ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000001e40)={0x1, 0x0, 0x2080, {0x0, 0x2, 0x2}, [], "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", "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"}) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000240)=0x5, 0x4) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x11c) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{}, {}, {}, {}]}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$loop(0x0, 0x0, 0x1000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 22:59:28 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 22:59:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 855.463364] kauditd_printk_skb: 294 callbacks suppressed [ 855.463379] audit: type=1400 audit(1550617168.874:30043): avc: denied { map } for pid=26780 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 855.513585] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) [ 855.637272] audit: type=1400 audit(1550617168.874:30044): avc: denied { map } for pid=26780 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 855.874453] audit: type=1400 audit(1550617168.874:30045): avc: denied { map } for pid=26780 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.071047] audit: type=1400 audit(1550617168.944:30046): avc: denied { map } for pid=26784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.200391] audit: type=1400 audit(1550617168.944:30047): avc: denied { map } for pid=26784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.225712] audit: type=1400 audit(1550617168.964:30048): avc: denied { map } for pid=26780 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.253941] audit: type=1400 audit(1550617168.964:30049): avc: denied { map } for pid=26780 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.305896] audit: type=1400 audit(1550617169.004:30050): avc: denied { map } for pid=26785 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.331118] audit: type=1400 audit(1550617169.004:30051): avc: denied { map } for pid=26785 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.354525] audit: type=1400 audit(1550617169.014:30052): avc: denied { map } for pid=26785 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a0") ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000001e40)={0x1, 0x0, 0x2080, {0x0, 0x2, 0x2}, [], "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", "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"}) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000240)=0x5, 0x4) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x11c) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{}, {}, {}, {}]}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$loop(0x0, 0x0, 0x1000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 22:59:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 856.940290] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 857.254321] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 858.089241] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:32 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 858.937856] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 860.256831] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 860.470502] kauditd_printk_skb: 298 callbacks suppressed [ 860.470517] audit: type=1400 audit(1550617173.874:30351): avc: denied { map } for pid=26892 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) [ 860.639669] audit: type=1400 audit(1550617173.944:30352): avc: denied { map } for pid=26892 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 860.685987] audit: type=1400 audit(1550617173.944:30353): avc: denied { map } for pid=26892 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.733415] audit: type=1400 audit(1550617174.044:30354): avc: denied { map } for pid=26899 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 860.869381] audit: type=1400 audit(1550617174.044:30355): avc: denied { map } for pid=26899 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.933476] audit: type=1400 audit(1550617174.044:30356): avc: denied { map } for pid=26900 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 861.107691] audit: type=1400 audit(1550617174.054:30357): avc: denied { map } for pid=26900 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.247041] audit: type=1400 audit(1550617174.184:30358): avc: denied { map } for pid=26903 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.285360] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 861.385712] audit: type=1400 audit(1550617174.204:30359): avc: denied { map } for pid=26903 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 861.612263] audit: type=1400 audit(1550617174.234:30360): avc: denied { map } for pid=26903 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:35 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 862.668107] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 22:59:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:37 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 863.718700] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 863.804048] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="0f00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:37 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) 22:59:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 864.441612] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="1000000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 865.487115] kauditd_printk_skb: 299 callbacks suppressed [ 865.487130] audit: type=1400 audit(1550617178.894:30660): avc: denied { map } for pid=27010 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 865.676470] audit: type=1400 audit(1550617178.934:30661): avc: denied { map } for pid=27016 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 865.853693] audit: type=1400 audit(1550617178.964:30662): avc: denied { map } for pid=27016 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) [ 866.043096] audit: type=1400 audit(1550617178.964:30663): avc: denied { map } for pid=27020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.049197] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 866.197952] audit: type=1400 audit(1550617178.964:30664): avc: denied { map } for pid=27020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="c000000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 866.324619] audit: type=1400 audit(1550617178.964:30665): avc: denied { map } for pid=27015 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 866.445860] audit: type=1400 audit(1550617178.974:30666): avc: denied { map } for pid=27015 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) [ 866.670234] audit: type=1400 audit(1550617178.984:30667): avc: denied { map } for pid=27016 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.836349] audit: audit_backlog=65 > audit_backlog_limit=64 [ 866.865881] audit: audit_backlog=65 > audit_backlog_limit=64 22:59:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="8001000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 867.014259] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:40 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 22:59:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2302000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:41 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 868.263359] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="c00e000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:41 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 22:59:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="e03f030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) 22:59:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 869.443474] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:42 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xc1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a835d8f9927f25526f8d3063570c8062c8e317c5c41da017eafae888d9e59141efaf615194cd8e280233e5fd8119464a393ef4636fe6f6ad6b59254ecec400a11d71e680e622e39c388de94497167298d4e773c3b8"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x801) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x0, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc) write$P9_RCLUNK(r0, &(0x7f0000000580)={0x2d792f47, 0x79, 0x4}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f00000000c0)=0x2, 0x4) stat(&(0x7f0000000440)='./file0//ile0\x00', &(0x7f0000000700)) setregid(0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') chdir(&(0x7f0000000340)='./file1\x00') getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000280)={@empty, 0xffffffff, 0x1, 0x2, 0x4, 0x1, 0xffffffff}, &(0x7f00000003c0)=0x20) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x141042, 0xb4) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) eventfd2(0x10001, 0x0) 22:59:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="6e00002018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) [ 870.373511] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="00f0ff7f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 870.514395] kauditd_printk_skb: 296 callbacks suppressed [ 870.514411] audit: type=1400 audit(1550617183.924:30951): avc: denied { map } for pid=27152 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 870.673420] audit: type=1400 audit(1550617183.964:30952): avc: denied { map } for pid=27158 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 870.844270] audit: type=1400 audit(1550617183.994:30953): avc: denied { map } for pid=27158 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 22:59:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 871.034760] audit: type=1400 audit(1550617183.994:30954): avc: denied { map } for pid=27158 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 871.103014] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 871.313125] audit: type=1400 audit(1550617183.994:30955): avc: denied { map } for pid=27158 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000200008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 871.563632] audit: type=1400 audit(1550617184.014:30956): avc: denied { map } for pid=27152 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 871.777404] audit: type=1400 audit(1550617184.014:30957): avc: denied { map } for pid=27152 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:45 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) [ 871.971390] audit: audit_backlog=65 > audit_backlog_limit=64 [ 871.977241] audit: audit_lost=436 audit_rate_limit=0 audit_backlog_limit=64 [ 871.977785] audit: audit_backlog=65 > audit_backlog_limit=64 [ 872.095444] selinux_nlmsg_perm: 5 callbacks suppressed [ 872.095480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27193 comm=syz-executor.1 22:59:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 872.177624] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27197 comm=syz-executor.1 22:59:45 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 22:59:45 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100100f80ecdb4cb9047ec8650407000000000000fb120011010e000500040019a9060015000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000012c0)='/dev/snd/pcmC#D#p\x00', 0x4001, 0x4040) r2 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000001300)=0x5040, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="03000000090002000001984f5ba6cf66b10e8cf395697453369531fa7141e4907c8decede04476aef5a4bc29eabbe5c51b97168aee7495520d54fbf27c7ece9659245fcc019cc422818de60f029f"], &(0x7f0000000100)=0xa) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000140)) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000001c0)=""/224) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000300)={@dev}, &(0x7f0000000340)=0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000400)="e56b5297afd449088451c49c1c1ffa2906d2a0c2bcfefdd937647af1dc56fa7257f489794f406886f62c2e3370ac94e389d2c2efef6a981a6a9e3d84c83818673ab5e308dca025abe53bb4e9d6630db768d997451337ed49ffc4c2ef8748c0171a844534984a0703b1e343d3636720896aa4237713950bc44876bbd3b8103a5a2142606c85c6c4e5d767cb5c024ed4e24871c65be99fbfdcaf9198adb31d60a2b70ca574bb3d1908b081ca863e4a4222b4228c40a2d94f2421ea32ff5cea01ea87f3cb2764386feff93a123c69cb96f17906405b0e400ff18ab2534051923377a146ad2e", &(0x7f0000001340)=""/4096}, 0x18) [ 872.222344] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) 22:59:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xc, 0x100000001, 0x2a8}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001280)={r0, 0x0, 0x0}, 0x18) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000200)={'ip_v\x86i0\x00\xe4\xff\xff\xff\xfe\"\x00', {0x2, 0x4e20, @loopback}}) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) [ 872.860907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=27217 comm=syz-executor.1 [ 873.057091] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=27223 comm=syz-executor.1 [ 873.150514] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000010008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 873.448698] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 22:59:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xc, 0x100000001, 0x2a8}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001280)={r0, 0x0, 0x0}, 0x18) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000200)={'ip_v\x86i0\x00\xe4\xff\xff\xff\xfe\"\x00', {0x2, 0x4e20, @loopback}}) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) [ 873.665767] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 22:59:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 873.795468] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:47 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40081, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x24, r1, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xfffffffffffff8e3}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x8001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0aeb1f023c123f3188a070") ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000840)={0x4, 0xa, 0x4, 0x1005800, {0x77359400}, {0x2, 0x0, 0x81, 0x4, 0x6, 0x7fffffff, '`u{w'}, 0x100000001, 0x5, @userptr=0x6, 0x4}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000340)='./bus\x00', 0x8, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)="391bfb2ec3b031b7c331e28cefb24426d37c9159e5226bd94315fb166a6f6bb135ca6b6bf1b2e7289d29640e6aa236093fbb77b461caf7a71711c14c175bef8626acefe100e447eb8abcb95675e00fc6d1a18f4e622fd280666b2aaaad1426745c8e4fd83c5c35f788f56ba5fac19deadebb9cca9f6f96203d5219f28b00f3b3822f90d93d15e57bbd8ba6f27a7aaf0cc4fe37759bd45a4a76c94cc31341194fd4958760a75e110e21", 0xa9}], 0x1db18d2e9b6d0909, &(0x7f00000005c0)={[{@part={'part', 0x3d, 0xecb}}, {@umask={'umask', 0x3d, 0x7fffffff}}], [{@fowner_gt={'fowner>', r3}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r4 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x8, 0x0) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f0000000680)) execve(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)=[&(0x7f0000000140)='bpf\x00'], &(0x7f0000000240)=[&(0x7f0000000200)='bpf\x00']) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000000040)={0x7fff}) mount$bpf(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) ioctl$CAPI_SET_FLAGS(r5, 0x80044324, &(0x7f0000000280)) [ 874.671393] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 22:59:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="0f00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 874.841012] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 874.944639] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 875.524230] kauditd_printk_skb: 300 callbacks suppressed [ 875.524245] audit: type=1400 audit(1550617188.934:31246): avc: denied { map } for pid=27283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 875.750173] audit: type=1400 audit(1550617188.974:31247): avc: denied { map } for pid=27283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="1000000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 875.926496] audit: type=1400 audit(1550617188.994:31248): avc: denied { map } for pid=27281 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 876.123320] audit: type=1400 audit(1550617188.994:31249): avc: denied { map } for pid=27281 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000080)=""/205) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="18", 0x1}], 0x1}, 0x0) sendto(r1, &(0x7f0000000bc0)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea", 0xc9, 0x0, 0x0, 0x0) shutdown(r1, 0x1) [ 876.263533] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 876.282692] audit: type=1400 audit(1550617189.024:31250): avc: denied { map } for pid=27283 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 876.398475] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 22:59:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 876.437103] audit: type=1400 audit(1550617189.024:31251): avc: denied { map } for pid=27283 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 876.542233] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 22:59:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 876.612988] audit: type=1400 audit(1550617189.074:31252): avc: denied { map } for pid=27281 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 876.731368] audit: type=1400 audit(1550617189.074:31253): avc: denied { map } for pid=27281 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="1b00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 876.911921] audit: type=1400 audit(1550617189.084:31254): avc: denied { map } for pid=27283 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 876.944001] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 876.975491] audit: audit_backlog=65 > audit_backlog_limit=64 22:59:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 877.609817] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 22:59:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 22:59:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="c000000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 877.823584] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 877.934147] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 22:59:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 878.141694] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 22:59:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="8001000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) 22:59:51 executing program 3: recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/237, 0xed}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000080)=""/2, 0x2}], 0x3, &(0x7f0000000640)=""/156, 0x9c}, 0x40010100) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000700), &(0x7f0000000740)=0x8) r1 = semget(0x2, 0x2, 0x100) semctl$SEM_STAT(r1, 0x4, 0x12, &(0x7f0000000880)=""/4096) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') ioctl$TIOCEXCL(r2, 0x540c) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x30000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x30, r3, 0x4, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x40000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000480)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000780)=ANY=[@ANYBLOB="646174615f6572723d69676e6f72652c00cd720067f30746e8825325fa70dd37009bb65c9c4663f12b9a65bc7c090500b604f623b1722a78f2985e4b5c3d9c55d58c80a84f09ad4ba39d4bc87531c301c54b9aa78ebd4ae13444196edd618b8262e3fcc955664d70a770fcd75ded5cbc858eac5e96f9ffffab70f2a55a4141dae89d36d688212ae96680ba05cc3a68e164117c7f943b531f91d19ada47ec3c825aa4174c21fc75a26fff1994be76639f213c1e6d86bdcffc19b8f8a0bfac023ee88a229ddbe787fa98ff585474a087d6b8ac63a8bc43341cd6602af1eaed2e9c3fa3a673df1fa067eee86238"]) [ 878.955788] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 878.982679] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 879.054174] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 22:59:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2302000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="c00e000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 880.028429] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 880.068161] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 22:59:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 880.218463] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 22:59:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 880.287293] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 22:59:53 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x161000, 0x0) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000140)=0xa2) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4, 0x2f5}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 22:59:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 880.541036] kauditd_printk_skb: 264 callbacks suppressed [ 880.541051] audit: type=1400 audit(1550617193.954:31499): avc: denied { map } for pid=27412 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.750827] audit: type=1400 audit(1550617193.954:31500): avc: denied { map } for pid=27412 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.900297] audit: type=1400 audit(1550617193.954:31501): avc: denied { map } for pid=27412 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.917758] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="e03f030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 881.077128] audit: type=1400 audit(1550617194.034:31502): avc: denied { map } for pid=27412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:54 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) [ 881.184281] audit: type=1400 audit(1550617194.034:31503): avc: denied { map } for pid=27412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.231694] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 881.384972] audit: type=1400 audit(1550617194.064:31504): avc: denied { map } for pid=27413 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.433549] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 22:59:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e02000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 881.571869] audit: type=1400 audit(1550617194.064:31505): avc: denied { map } for pid=27413 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="6e00002018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 881.791048] audit: type=1400 audit(1550617194.124:31506): avc: denied { map } for pid=27412 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.821246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 881.988830] audit: type=1400 audit(1550617194.124:31507): avc: denied { map } for pid=27413 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 22:59:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 882.178034] audit: audit_backlog=65 > audit_backlog_limit=64 22:59:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e04000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="00f0ff7f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) [ 883.272182] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e05000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000200008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 22:59:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 883.798279] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27498 comm=syz-executor.2 [ 883.976601] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27503 comm=syz-executor.2 22:59:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}) [ 884.043389] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e06000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 885.045911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=27527 comm=syz-executor.2 [ 885.160982] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:59:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 885.256781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=27535 comm=syz-executor.2 [ 885.343771] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 22:59:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:59:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000010008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:59 executing program 3: 22:59:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e08000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 885.552543] kauditd_printk_skb: 222 callbacks suppressed [ 885.552559] audit: type=1400 audit(1550617198.964:31728): avc: denied { map } for pid=27536 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.756839] audit: type=1400 audit(1550617198.964:31729): avc: denied { map } for pid=27536 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.872582] audit: type=1400 audit(1550617199.004:31730): avc: denied { map } for pid=27536 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 885.920201] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 886.019355] audit: type=1400 audit(1550617199.164:31731): avc: denied { map } for pid=27544 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:59 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10201}, {0x80}, 0x0, 0x41}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10002, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x2, 0x8, 0x1, 0x100000001, 0xff, 0xfff, 0x80000001, {0x0, @in6={{0xa, 0x4e23, 0x3, @remote, 0x4}}, 0x1000, 0x7, 0x9, 0x9, 0x20}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r1, &(0x7f0000000240)=0x4) [ 886.060950] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 22:59:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 22:59:59 executing program 3: 22:59:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 886.185931] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 886.210429] audit: type=1400 audit(1550617199.164:31732): avc: denied { map } for pid=27544 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:59:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 886.409679] audit: type=1400 audit(1550617199.254:31733): avc: denied { map } for pid=27544 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 886.535565] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0a000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 886.655191] audit: type=1400 audit(1550617199.254:31734): avc: denied { map } for pid=27544 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:00 executing program 3: 23:00:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x14c00) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0x3, {0x10000, 0x8, 0x7, 0x7, 0x3, 0x3}}) 23:00:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 886.917501] audit: type=1400 audit(1550617199.264:31735): avc: denied { map } for pid=27548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 887.104977] audit: type=1400 audit(1550617199.274:31736): avc: denied { map } for pid=27548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 887.294209] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 887.389668] audit: type=1400 audit(1550617199.284:31737): avc: denied { map } for pid=27548 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 887.401929] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:00:00 executing program 3: 23:00:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0c000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x101, 0x8, 0x3, 0x3f, 0x9, 0x3, 0x9, {0x0, @in6={{0xa, 0x4e23, 0x2, @rand_addr="9d2669c3e15dda43be65d6a69124e54a", 0x8}}, 0x4, 0x50, 0x200, 0x5, 0x2}}, &(0x7f0000000040)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x3}, 0x8) [ 887.702330] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:01 executing program 3: 23:00:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0xfffffffffffffffe, 0x88, 0x1}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0e000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:02 executing program 3: [ 888.991306] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:00:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x5, 0x288880) [ 889.033191] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:02 executing program 3: [ 889.110626] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:00:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:02 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 889.446664] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:00:02 executing program 3: [ 889.561969] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:03 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x401, 0x2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L-', 0x3}, 0x28, 0x2) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000140)={{0x2, 0x4e20, @multicast2}, {0x1}, 0x14, {0x2, 0x4e23, @remote}}) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x1f, 0x2}, 'port1\x00', 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x81}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e10000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 889.906132] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:00:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:03 executing program 3: [ 890.574334] kauditd_printk_skb: 209 callbacks suppressed [ 890.574349] audit: type=1400 audit(1550617203.984:31929): avc: denied { map } for pid=27657 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x28002) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 890.652798] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:04 executing program 3: 23:00:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e60000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 890.731003] audit: type=1400 audit(1550617203.984:31930): avc: denied { map } for pid=27657 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 890.781234] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:00:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 890.948934] audit: type=1400 audit(1550617203.994:31931): avc: denied { map } for pid=27654 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 891.083136] audit: type=1400 audit(1550617204.004:31932): avc: denied { map } for pid=27657 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:04 executing program 3: [ 891.132795] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:00:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000280)=""/76, &(0x7f0000000040)=0x4c) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000340)={r2, 0x81}, &(0x7f0000000380)=0x10) r3 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x2, 0x20040) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0x3, 0x10006}, {0x80, 0x40000000}, 0x100000002000000, 0x3, 0x3ff}) 23:00:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 891.226450] audit: type=1400 audit(1550617204.014:31933): avc: denied { map } for pid=27654 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 891.450442] audit: type=1400 audit(1550617204.024:31934): avc: denied { map } for pid=27657 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 891.536370] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 891.607490] audit: type=1400 audit(1550617204.024:31935): avc: denied { map } for pid=27657 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 891.757287] audit: type=1400 audit(1550617204.044:31936): avc: denied { map } for pid=27657 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:05 executing program 3: 23:00:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2ef0000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 891.931640] audit: type=1400 audit(1550617204.054:31937): avc: denied { map } for pid=27654 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 892.106382] audit: audit_backlog=65 > audit_backlog_limit=64 23:00:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) r1 = socket$inet6(0xa, 0x2, 0x5) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x233) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x19) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) [ 892.466553] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 892.505058] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x34308a44}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e46030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x90, 0x0, 0xfffffffffffffffd, 0x3ff}) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000080)='/dev/snd/seq\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r2, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x6}, [{0x2, 0x3, r3}], {0x4, 0x1}, [{0x8, 0x92f005ea7ff7633a, r4}], {0x10, 0x5}, {0x20, 0x7}}, 0x34, 0x2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r5 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x7, 0x10}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e24, 0x0, @ipv4={[], [], @remote}, 0x8}}}, 0x84) accept$alg(r1, 0x0, 0x0) [ 893.130480] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:00:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e47030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 893.253291] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:00:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e02000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 893.553076] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 894.254794] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 23:00:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000cab000)=0x5) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22002000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x720, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) setresuid(r1, r1, 0x0) setreuid(r1, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'vxcan1\x00', 0x8000000000000000}) 23:00:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000140)={{0x100000000, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) [ 894.556259] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 894.970697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27776 comm=syz-executor.3 23:00:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2ebb050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e04000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x4, 0xffffffffffffff80}, 'port1\x00', 0xe0, 0x800, 0x29, 0x734, 0xf39, 0x7, 0x1, 0x0, 0x2, 0x80}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 895.265305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27772 comm=syz-executor.3 23:00:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x80, 0x4, 0x8, 0x26, 0x1}, 0x2c) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x3ff, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1052, 0x202800) accept4$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x10, 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000200)) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, 0x0) r3 = timerfd_create(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(r3, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0xfdfdffff, 0x1, 0x1}) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000480)={[], 0x0, 0x0, 0x0, 0x0, 0x8, 0x3000, 0x6002, [], 0x9}) [ 895.446401] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 895.626338] kauditd_printk_skb: 271 callbacks suppressed [ 895.626352] audit: type=1400 audit(1550617209.034:32207): avc: denied { map } for pid=27795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) 23:00:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00060018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 895.737046] audit: type=1400 audit(1550617209.034:32208): avc: denied { map } for pid=27795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e05000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 895.771228] audit: type=1400 audit(1550617209.044:32209): avc: denied { map } for pid=27795 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 895.918859] audit: type=1400 audit(1550617209.054:32210): avc: denied { map } for pid=27795 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 896.076565] audit: type=1400 audit(1550617209.064:32211): avc: denied { map } for pid=27795 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 896.263889] audit: type=1400 audit(1550617209.064:32212): avc: denied { map } for pid=27795 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 896.431136] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 896.451091] audit: type=1400 audit(1550617209.074:32213): avc: denied { map } for pid=27795 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x105000, 0x0) fdatasync(r0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 896.646513] audit: type=1400 audit(1550617209.094:32214): avc: denied { map } for pid=27795 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e06000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000a0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 896.786547] audit: type=1400 audit(1550617209.124:32215): avc: denied { map } for pid=27795 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 896.836312] audit: type=1400 audit(1550617209.134:32216): avc: denied { map } for pid=27795 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x80, 0x4, 0x8, 0x26, 0x1}, 0x2c) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x3ff, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1052, 0x202800) accept4$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x10, 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000200)) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, 0x0) r3 = timerfd_create(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(r3, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0xfdfdffff, 0x1, 0x1}) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000480)={[], 0x0, 0x0, 0x0, 0x0, 0x8, 0x3000, 0x6002, [], 0x9}) 23:00:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000180)='/dev/snd/seq\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3fb9, 0x80000001, 0x5804, 0x6, 0x0, 0x8, 0x215, 0x4, 0x3, 0x2f, 0xbc6b, 0x7d, 0x6, 0x1000, 0x4, 0x3ff, 0x680, 0x7f5, 0x9, 0x5, 0x1, 0x9, 0x4, 0x847a, 0x20, 0xfffffffffffffffc, 0x3, 0x0, 0x2, 0x8b7, 0x3, 0x80, 0xff, 0x5, 0x2000, 0x101, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x20000, 0x200, 0x8001, 0x8, 0xff, 0x8, 0x8}, r1, 0x9, 0xffffffffffffff9c, 0x2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x501100) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000040)={0x0, 0x7, 0x9}) 23:00:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e08000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 897.248217] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000c0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0a000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fd/3\x00') lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2004420, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c0500646e6f3f", @ANYRESHEX=r0, @ANYBLOB=',version=9p2000.u,afid=0x00000000000007ff,euid=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 898.620342] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:12 executing program 3: syz_open_dev$evdev(0x0, 0x0, 0xa0800) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) link(0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r5 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0x0}, 0x4) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYRES64, @ANYRESHEX=r3, @ANYRES64=r2], 0x3, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000100)=0x47) 23:00:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0b000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0c000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e003f0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 900.027745] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x41045508, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) 23:00:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0xf, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x0, 0x10001}, {0x80}, 0x0, 0x2}) [ 900.684166] kauditd_printk_skb: 222 callbacks suppressed [ 900.684180] audit: type=1400 audit(1550617214.094:32439): avc: denied { map } for pid=27921 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0e000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00400018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 900.850127] audit: type=1400 audit(1550617214.134:32440): avc: denied { map } for pid=27924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x10, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 900.979984] audit: type=1400 audit(1550617214.134:32441): avc: denied { map } for pid=27924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200040, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x7e, 0x100000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x2000000000}) ioctl$KDSETMODE(r1, 0x4b3a, 0x77) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:14 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0xfffffffffffe, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmmsg(r2, &(0x7f000000d8c0)=[{{0x0, 0xffffffffffffff70, &(0x7f00000002c0)}}], 0x388, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r1) socket(0x840000000002, 0x3, 0xff) syz_open_procfs(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000080)={0xd, @vbi={0x1, 0xffffffffffffff15, 0xffff, 0x56544943, [0x0, 0x1000], [0x2, 0x1], 0x3}}) r4 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffffffffffe) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000001480)={@in={{0x2, 0x4e21, @rand_addr=0x4}}, 0xfffffffffffffffd, 0x5, 0x6, "87fc774793a5b479c1c35207640ee4aeae6b5b63b589d07ae8901cdc62f34aa2831975dc69aed5fd7a489a79beb4c84348a017d5f35d789f1b9d6f52d81e21a52961e5ce09eb4c91aad44bc0b5dc7b86"}, 0xd8) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000440)={0x3c, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000200000000000000000000000000000018000800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a627300000000", @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']]}) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) [ 901.101399] audit: type=1400 audit(1550617214.144:32442): avc: denied { map } for pid=27921 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 901.263695] audit: type=1400 audit(1550617214.144:32443): avc: denied { map } for pid=27921 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0xc0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e10000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 901.459652] audit: type=1400 audit(1550617214.164:32444): avc: denied { map } for pid=27921 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03460018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 901.611037] audit: type=1400 audit(1550617214.164:32445): avc: denied { map } for pid=27921 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 901.837182] audit: type=1400 audit(1550617214.174:32446): avc: denied { map } for pid=27925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:15 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x460001) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 902.034768] audit: type=1400 audit(1550617214.174:32447): avc: denied { map } for pid=27925 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 902.165629] audit: audit_backlog=65 > audit_backlog_limit=64 [ 902.243965] binder: 27955:27967 transaction failed 29189/-22, size 524312-35184405643264 line 2896 23:00:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0xec0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e60000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03470018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x9, 0x8) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x33fe0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:18 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) close(r0) 23:00:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2ef0000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e65580018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x200003b0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 904.819707] binder: undelivered TRANSACTION_ERROR: 29189 23:00:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x81}, {0x80}, 0x8, 0x1, 0x2}) 23:00:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x7ffff000, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00600018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:18 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) close(r0) 23:00:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e62020018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x3, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt(r0, 0x899, 0x5, &(0x7f0000000000)=""/109, &(0x7f0000000140)=0x6d) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000200)) fcntl$dupfd(r2, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 905.701741] kauditd_printk_skb: 252 callbacks suppressed [ 905.701755] audit: type=1400 audit(1550617219.114:32671): avc: denied { map } for pid=28145 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:19 executing program 3: r0 = syz_open_dev$dri(0x0, 0x3fc, 0x3fffe) socketpair(0x1, 0x5, 0x5, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)=0x0) sched_setaffinity(r1, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000b60000/0x4000)=nil) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x7000) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000500)="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") shmdt(r3) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000300)) clone(0x4000, &(0x7f0000000380)="675b650fadce7e985eab97c09770a8c72f8bf9da0bd325b21ebae1a0940bfb1bb9aa0658b5a4d8f9d1774c68fcffb56bcc0e373aa846adef2c9c30be36b32aa4b4e93ffde1fab67785a5e16f6b0d8a79236d76d493fb6669ec54368189", 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x20) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20000, 0x0) fsetxattr$security_selinux(r5, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:root_t:s0\x00', 0x1c, 0x3) write$FUSE_BMAP(r5, &(0x7f00000000c0)={0x18, 0x0, 0x8, {0x8}}, 0x18) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) splice(r5, &(0x7f0000001500)=0x8, r0, &(0x7f0000001540), 0x4, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)) 23:00:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e58650018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 905.915325] audit: type=1400 audit(1550617219.114:32672): avc: denied { map } for pid=28145 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 906.122361] audit: type=1400 audit(1550617219.114:32673): avc: denied { map } for pid=28145 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 906.380715] audit: type=1400 audit(1550617219.144:32674): avc: denied { map } for pid=28145 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 906.431385] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=28164 comm=syz-executor.5 [ 906.520019] audit: type=1400 audit(1550617219.244:32675): avc: denied { map } for pid=28150 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0xb5d}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0xfd, 0x5}, {0x3, 0xffffffff}, 0x2, 0x6, 0x7}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 906.679590] audit: type=1400 audit(1550617219.264:32676): avc: denied { map } for pid=28153 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x8, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 906.826882] audit: type=1400 audit(1550617219.264:32677): avc: denied { map } for pid=28153 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 906.983299] audit: audit_backlog=65 > audit_backlog_limit=64 [ 906.989159] audit: audit_lost=466 audit_rate_limit=0 audit_backlog_limit=64 [ 906.996705] audit: type=1400 audit(1550617219.304:32678): avc: denied { map } for pid=28150 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00810018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 907.286912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=28184 comm=syz-executor.5 23:00:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x8000000000}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x80000) ioctl$RTC_WIE_ON(r1, 0x700f) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000140)=0x5) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000002c0)) 23:00:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e46030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0xb, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:21 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000040)=@rose={'rose', 0x0}, 0x10) read(r0, &(0x7f0000000080)=""/250, 0xfa) read(r0, &(0x7f0000000180)=""/72, 0x48) r1 = getpgrp(0x0) r2 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000200)={r0, r0, 0x100000001}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) fcntl$setown(r0, 0x8, r2) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000280)=""/247) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x7}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400)={r3, 0x0, 0x3e1f, 0xd988}, &(0x7f0000000440)=0x10) recvmsg$kcm(r0, &(0x7f0000000980)={&(0x7f0000000480)=@x25, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/148, 0x94}, {&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f00000006c0)=""/125, 0x7d}, {&(0x7f0000000740)=""/112, 0x70}, {&(0x7f00000007c0)=""/146, 0x92}, {&(0x7f0000000880)=""/20, 0x14}], 0x6, &(0x7f0000000940)=""/53, 0x35}, 0x40) getsockname$inet(r0, &(0x7f00000009c0)={0x2, 0x0, @empty}, &(0x7f0000000a00)=0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='trusted.overlay.opaque\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x1) fcntl$setown(r0, 0x8, r2) r4 = request_key(&(0x7f0000000b00)='user\x00', &(0x7f0000000b40)={'syz', 0x0}, &(0x7f0000000b80)='rose', 0xfffffffffffffffd) keyctl$clear(0x7, r4) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000c00)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0xf0e70db40f1f3f02}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x24, r5, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xff}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) execveat(r0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40), &(0x7f0000000e00)=[&(0x7f0000000d80)='md5sumnodev\x00', &(0x7f0000000dc0)='/selinux/policy\x00'], 0x0) fcntl$setsig(r0, 0xa, 0x1f) sysfs$3(0x3) r6 = inotify_init() write(r6, &(0x7f0000000e40)="e22007bf7dcd649dbb8c39745240b97cd87f06e69efaf5d048cc69f09d424e8bbe8723564f1a8f2165007526a9226cb6c03ed626ba8f0d78a033d898793307fb432cbddbf0421a263efdef8dcac5a8e98f03d9307f3a0a9d5702f0ff40190eeacd30243b655b7287ef42c43a041d6d15e1c7b66e4a310b7bebc3c132ad23ce0087877c5adc5bbfabeff3d367", 0x8c) mq_notify(r0, &(0x7f0000000f00)={0x0, 0x1d, 0x0, @tid=r2}) sched_getparam(r1, &(0x7f0000000f40)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000f80)={{{@in6=@local, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000001080)=0xe8) syz_open_dev$dri(&(0x7f00000010c0)='/dev/dri/card#\x00', 0x9, 0x10200) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000001100)=0x1, 0x4) 23:00:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e05bb0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e47030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000380)=r3) socketpair(0x9, 0x3, 0x6, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0x2bdcdca2) getuid() ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x0, 0x10005}, {0x1}, 0x800000000000002, 0x5}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000340)={@empty, 0x3, r3}) [ 908.182329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pig=28212 comm=syz-executor.5 23:00:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0xf, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00f00018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xffffffff, 0x204000) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8100, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) 23:00:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:22 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20002, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1f, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0x0, 0x6, 0x4, 0x9, 0x7f}, 0x0, 0x0, r2, 0x8) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[]) sendto$unix(r0, &(0x7f0000000540)="0554a818ecf915e62919fb6b6da6a277cf4f73fe4186714ba15fd3098d03ad2b889699447cef027455da95ce2cefc27716dc36c9590b982b22b8a3bbc41bba15f6069fad8f5e04594585c9cc21008f352bb4b77f42549a217be76ae35124f2200870b8f19310977909d3a3ee0e3b77c35e253db8827a654cdb4dc35a8e6c20ab885e971f5c12a461789b4f4e3000c542e4c8d2cd6bfa11e1cce81d818cc87b9bc4f49d6a50c94c96ff9797901e883a49a1f647cc9637594525f7f83652430a079ef05069b5c8e1048a4b14b6ac4a84f0ebd7008d3257b9fa3736391a789cf521e265", 0xe2, 0x240448d1, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 23:00:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 909.442014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=28243 comm=syz-executor.5 23:00:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x17, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e43050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 910.140126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pig=28268 comm=syz-executor.5 23:00:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x25, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 910.435425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=28285 comm=syz-executor.1 [ 910.687606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=28322 comm=syz-executor.1 23:00:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000040)={0x0, 0xffffffffffffffe0}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000140)={{0x2, 0x7}, {0x2, 0xf76d}, 0x2, 0x4, 0x40}) [ 910.730929] kauditd_printk_skb: 272 callbacks suppressed [ 910.730944] audit: type=1400 audit(1550617224.144:32947): avc: denied { map } for pid=28290 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000020008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 910.933738] audit: type=1400 audit(1550617224.154:32948): avc: denied { map } for pid=28324 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 910.965843] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 23:00:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x67, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 911.100735] audit: type=1400 audit(1550617224.164:32949): avc: denied { map } for pid=28324 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00060018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 911.293031] audit: type=1400 audit(1550617224.174:32950): avc: denied { map } for pid=28324 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00f00018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) socket$inet(0x2, 0x4, 0x7) [ 911.460520] audit: type=1400 audit(1550617224.174:32951): avc: denied { map } for pid=28324 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 911.599854] audit: type=1400 audit(1550617224.194:32952): avc: denied { map } for pid=28290 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 911.721834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=28401 comm=syz-executor.5 [ 911.804007] audit: type=1400 audit(1550617224.194:32953): avc: denied { map } for pid=28290 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0xe24, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 912.037286] audit: type=1400 audit(1550617224.204:32954): avc: denied { map } for pid=28324 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 912.242753] audit: type=1400 audit(1550617224.254:32955): avc: denied { map } for pid=28324 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.357414] audit: audit_backlog=65 > audit_backlog_limit=64 23:00:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000a0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000002c0)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e21, 0x15e6, @rand_addr="899f17745b7ec10dd5bf3ebf22ffbf36", 0x2}, @in6={0xa, 0x4e20, 0x5, @local, 0x2}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e24, 0x680e, @rand_addr="070be50d0f568d248554f7769bd00456", 0x1}, @in6={0xa, 0x4e22, 0x54b96c0, @empty, 0x800}, @in6={0xa, 0x4e22, 0x0, @loopback, 0x10001}], 0xbc) openat(r1, &(0x7f0000000040)='./file0\x00', 0x20000, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x40030000000000, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc00000003000600000000190200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) [ 912.867529] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3620 sclass=netlink_route_socket pig=28421 comm=syz-executor.5 23:00:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0xea0, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 913.095930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=28425 comm=syz-executor.1 23:00:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xffffffffffffffd7, 0x350, 0x80000001, 0x4}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e21, 0x7, @empty, 0xff}}, 0x1f, 0x5, 0x6, 0x3, 0xa}, &(0x7f00000002c0)=0x98) r2 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000300)={[{0xf800000000000000, 0x5, 0x800, 0xfffffffffffffff8, 0xfff, 0x1ff, 0x3, 0xc9, 0x2, 0x8, 0x100, 0x6, 0x7fffffff}, {0x1, 0xffff, 0x8000, 0x20, 0x7ff, 0xea5, 0x1, 0x5, 0x9, 0x9, 0x5, 0x4, 0x26}, {0x1, 0x1, 0x80, 0x80000001, 0x8001, 0x7fffffff, 0x7fffffff, 0x0, 0x1, 0x7, 0x100000000, 0xff, 0x9}], 0x6}) [ 913.415081] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=28434 comm=syz-executor.1 23:00:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00020018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000b0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 914.037736] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3744 sclass=netlink_route_socket pig=28447 comm=syz-executor.5 23:00:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x20000010, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x400040) 23:00:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00040018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000c0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 914.896743] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xffffffffffffffd7, 0x350, 0x80000001, 0x4}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e21, 0x7, @empty, 0xff}}, 0x1f, 0x5, 0x6, 0x3, 0xa}, &(0x7f00000002c0)=0x98) r2 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000300)={[{0xf800000000000000, 0x5, 0x800, 0xfffffffffffffff8, 0xfff, 0x1ff, 0x3, 0xc9, 0x2, 0x8, 0x100, 0x6, 0x7fffffff}, {0x1, 0xffff, 0x8000, 0x20, 0x7ff, 0xea5, 0x1, 0x5, 0x9, 0x9, 0x5, 0x4, 0x26}, {0x1, 0x1, 0x80, 0x80000001, 0x8001, 0x7fffffff, 0x7fffffff, 0x0, 0x1, 0x7, 0x100000000, 0xff, 0x9}], 0x6}) 23:00:28 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x94ce7ee07e52ed21) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3ff, 0x90101) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000580)=""/37) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xfffffffffffffdb8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x200004, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xab0c}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xa00}}, {@allow_other='allow_other'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/snd/seq\x00'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@obj_user={'obj_user', 0x3d, 'trusted\xfcvmnet0'}}, {@subj_type={'subj_type'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000300)) eventfd2(0x0, 0x80801) 23:00:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x2, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 915.742285] kauditd_printk_skb: 287 callbacks suppressed [ 915.742300] audit: type=1400 audit(1550617229.154:33223): avc: denied { map } for pid=28489 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 915.926999] audit: type=1400 audit(1550617229.194:33224): avc: denied { map } for pid=28492 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6gre0\x00', 0x10) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) [ 916.089277] audit: type=1400 audit(1550617229.204:33225): avc: denied { map } for pid=28489 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x5) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x6e2202, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000140)={'bpq0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 916.313946] audit: type=1400 audit(1550617229.214:33226): avc: denied { map } for pid=28492 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x802, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 916.509596] audit: type=1400 audit(1550617229.264:33227): avc: denied { map } for pid=28492 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e003f0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 916.673746] audit: type=1400 audit(1550617229.314:33228): avc: denied { map } for pid=28492 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 916.829156] audit: type=1400 audit(1550617229.314:33229): avc: denied { map } for pid=28492 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.027381] audit: type=1400 audit(1550617229.334:33230): avc: denied { map } for pid=28495 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.243199] audit: type=1400 audit(1550617229.334:33231): avc: denied { map } for pid=28495 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x804, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x2000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0xc0, @ipv4={[], [], @empty}, 0x8}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x10000, 0x101000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x82, "459a35fb7a38c65719c2c9ae20c024c1886deed653cb20e09d873ba4e509316e6546a3df78432738cff18ca704e6f83710dc77e35ba3f8576028c9caf82bfcb2a6e66b9d2440e429ae7f2654d3acb5ce9f5ed594f95edf7fc5f5ea881bcd730ba6ae045b7f3bee5cb40929d9f7010f42ad279abd850282f9d6e6abb22860a1b3b4e4"}, &(0x7f0000000180)=0x8a) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, &(0x7f0000000300)=0x4) [ 917.296553] audit: audit_backlog=65 > audit_backlog_limit=64 23:00:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00060018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1b) ioctl$TCFLSH(r0, 0x5412, 0x709000) 23:00:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x808, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00400018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) setreuid(r1, r2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x3}) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000400)="eafeb13b82a48272ca9350fb25680868e969995bff01b9f8a21168d9479f787ae8172786edc93170213560e0ca0dfa7f9010f05850bef80872c923443616666a6e548981844b5d668a4622323eb50b54dfd0f8ca0b980713a45ac7661268ec78981500c22d09706a1ca819ac3e84240044bd8ae5061b7a830c9305a60cee7aa2a29fefda99882f8cb9cea4866b881a6374871eb272af629220f801500773587f531752a354021b71d31f23cc5d635deaa7cb6a3b74ecb97bc9bda0293a21c57427097f0d0a9830a84ee89730fbba1cde14b003c576d2e967c94ce4a4c6a32ad87d57013a9d202a3de076", 0xea, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000012000/0x3000)=nil, 0x3000, 0x80004, 0x8010, r0, 0x0) r1 = request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='gretap0\x00', 0xfffffffffffffffb) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() keyctl$chown(0x4, r1, r2, r3) r4 = userfaultfd(0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f00000003c0)="48dd3275a2a5855685464854f7fb7edac0faba85bfa191e8769e3675766f3537e4f849024cec1fe7e05a913efd018c72cefe898abff8211714ca10100aace3ad370b5ad1acb1c869f4a2a704251480a89ca0914dad7eb68c97253ba0eab516715d03ae00a5b8806e8fbbdbcce59a76c142fd6484f4a06b56b4e5f606413dee881447db96ad137785fd1cbd90c0945ecbe4245541ce711d1b") ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = getpid() ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0xeb3f) wait4(r6, &(0x7f00000001c0), 0x6, &(0x7f0000000200)) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCNXCL(r7, 0x540d) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r8, 0x84, 0x8, &(0x7f0000013e95), 0x4) r9 = semget$private(0x0, 0x7, 0x1) semctl$SETVAL(r9, 0x4, 0x10, &(0x7f0000000480)=0x4) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f0000000040)={'gretap0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000000000000000000000067d1da000000de"]}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r7, 0xae04) close(r8) close(r4) ioctl$NBD_CLEAR_QUE(r7, 0xab05) 23:00:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00080018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000a0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="0f00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x80f, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e05430018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:32 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x8003, 0x200) getsockname$packet(r0, 0x0, &(0x7f0000000240)=0x3c9) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, &(0x7f0000000e40)=""/143, 0x8f, 0x8}}], 0x1, 0x0, 0x0) pipe(0x0) sched_setaffinity(0x0, 0x181, &(0x7f0000000180)=0x9) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x117, 0x1) r1 = creat(&(0x7f0000000580)='./file0\x00', 0xfffffffffffffffd) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000480)) connect$inet(r2, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000300)={0x1b8abab, {0x2, 0xfffffffffffffffe, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3}) sendmmsg(r2, &(0x7f0000007fc0), 0x40000000000002f, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) ptrace(0xfffffffffdffffff, r3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f00000000c0)) [ 919.304226] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000c0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x817, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03460018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000000)={{0x80, 0x9}, 'port0\x00', 0x8, 0x0, 0x0, 0xb, 0x2, 0x10000000000, 0x6e0, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1000, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x800}}, {@mode={'mode', 0x3d, 0xfffffffffffffffe}}], [{@subj_role={'subj_role', 0x3d, '/dev/snd/seq\x00'}}, {@obj_role={'obj_role', 0x3d, 'mime_typeGPL@\\$selinuxmd5sum'}}, {@permit_directio='permit_directio'}, {@smackfshat={'smackfshat', 0x3d, '#trusted.,{wlan0vmnet1wlan0vmnet1'}}]}) 23:00:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="1000000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 920.272303] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="1b00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x83e, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03470018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x2}, 0x0, 0x1}) r1 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000200)="b129a351bd5a38433a19de0fc2871565280e9f37add300faf1831588f162cf4b3a05c0028f26345d1823f87e38ce0bf62b2db5ac0696b4402d38821b0bdda04bcf01b027d1d1bd432657ec4903f42454c6dc635011a66bd50cf95816dfc202d5aa07d1883b22e38aa19ab839187cdb5ed2835810e4e78693581781ad26ecb377df46db2a485c5e355d61a9f6bbba2a64452c840a2e5fd6ea1896770d0134d66bae2f0a28f85325319c35248d2dcc9b333848f7e5b87378603088dd23221cf65eddd792403eae4eb6dcc5bc3715a9", 0xce, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r1) 23:00:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 920.769573] kauditd_printk_skb: 280 callbacks suppressed [ 920.769588] audit: type=1400 audit(1550617234.174:33501): avc: denied { map } for pid=28717 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x171}}], 0x1, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xc00, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200400, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x6, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0) 23:00:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0xc00e, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 920.940052] audit: type=1400 audit(1550617234.174:33502): avc: denied { map } for pid=28717 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e65580018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 921.074685] audit: type=1400 audit(1550617234.184:33503): avc: denied { map } for pid=28717 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 921.327330] audit: type=1400 audit(1550617234.184:33504): avc: denied { map } for pid=28717 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="3000000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 921.497121] audit: type=1400 audit(1550617234.384:33505): avc: denied { map } for pid=28748 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00100018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 921.640244] audit: type=1400 audit(1550617234.414:33506): avc: denied { map } for pid=28748 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x2, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:35 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10002}, {0x80, 0x3}, 0x0, 0x1}) [ 921.803145] audit: type=1400 audit(1550617234.414:33507): avc: denied { map } for pid=28748 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.087518] audit: type=1400 audit(1550617234.414:33508): avc: denied { map } for pid=28748 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 922.280997] audit: type=1400 audit(1550617234.434:33509): avc: denied { map } for pid=28748 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00600018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 922.479287] audit: type=1400 audit(1550617234.734:33510): avc: denied { map } for pid=28753 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.570162] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x20, 0x280100) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="c000000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00600018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x3, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e02620018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={'bond_slave_0\x00\x0e\x00'}) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)={'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xf1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x1000, {0x77359400}, {0x0, 0x0, 0x270, 0x0, 0x0, 0x0, "33e0da32"}, 0x0, 0x0, @userptr=0x2, 0x4}) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) getpriority(0x1, r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000040)={0x0, 0x100000, 0x0, 0x0, 0x4}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 23:00:36 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) sendmsg$xdp(r0, &(0x7f0000001500)={&(0x7f00000001c0)={0x2c, 0x0, r1, 0x21}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000200)="615195e3f118a3dc10d2fafa75492533bc127aa1079c5c33d9f262322ede3e9cae1c9821214bc16a259649ec39f29fbc0c562c0989034e6f02bc84f5afd39fec0b3b398f3d172d464e96a75fde4aacf67150b21e84e1bf18e6d5cb6c46e8d56c8d557a80c520e44042b700020aad2d96c03b010db600cb01f42996ad58898c0b1f36c7bc80b434707e89392b2f4e90ccfce8e2e335756cf39eb2948d7d230a36ec448302d084b3d74f76bf47c5c6b6fd7670fe666560", 0xb6}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="91c9b50058742b4900f9e3cd2f5c7288eccb92ab2af0580cab02d3dcc9cb33a12689d22758124a1ebc042d234630fd0423b2676c1eaf00c09b7d420025df", 0x3e}, {&(0x7f0000001300)="dbb24524fea2506ca51fe2dcd377714bcbdef5d6ddb1287d472647507cee11b8845f94c25a9b4c45c2a8a2232d75cec7b85273725c89c5ca3e8f39314c3b627e87f4848e46c18ea4f082cb8a4f0617c53557bba5aca6fc95e592382df633814ba55e5c60b3b779b4b8c25a347a12", 0x6e}, {&(0x7f0000001380)="78acce8417d77290f577a14d1df228cd837499cec6d620ff512a8716a958422f3ec0696c0a76907ff5c7674ecdafb0691e0bd5b7d8c032aad03e232eac386576dfd11444a38452ba33642b97e073f045f42ebec2a8b176b2ec028331a343b017d2586cc52691e620d9b18ad9642dd904b9fb844283223731194cd1d0c4986d8940474837af6af9ea9970aeb25f9763eac469dee865fe1ab5f42b6e6a3abb72dfdd777c94f6a02bc56aa59516a28e95164784513bf0721542fd6798abc78526d160fb27651c7ed90625bd7c79e40e1bf9a0445b71ff335dc62381d45494b33c7aad37ac909a2a9fc96fd27fd569ea5a44", 0xf0}], 0x5, 0x0, 0x0, 0x4}, 0x8000) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x4000000004}) [ 923.499699] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="8001000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00f00018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e58650018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000480)={0x84, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x1, 'wlc\x00', 0x20, 0x4, 0x50}, 0x2c) write$FUSE_ENTRY(r1, &(0x7f00000003c0)={0x90, 0x0, 0x7, {0x2, 0x3, 0xbe2, 0x80, 0x7fffffff, 0x676, {0x2, 0x10000, 0x9, 0x7600000000000000, 0x5, 0x8, 0x8000, 0x1, 0x2, 0x0, 0x3, r2, r3, 0x6, 0x6}}}, 0x90) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x7, 0x200000000}, 'port1\x00', 0x0, 0x0, 0x6, 0xffff, 0x9, 0x2, 0x9, 0x0, 0x5, 0xdb}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:38 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESHEX=r0, @ANYRESDEC], @ANYRESOCT=r3, @ANYRESDEC=r0, @ANYRES64=r0, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r3, @ANYBLOB="488026b0291ed206be20f4e578ba16361927216eada3156ad25384053e3c6ce059c17dc15b9967966f3d7b40da", @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYBLOB="b228df75ebfb6cee9483e8ece159fd332124bf3e6e4292d54cd48cbb1ac18a92a7b5f54d37416220cfd62baf7e1ee683696f1d70c59954c41a8f2f2400b8d5aabd37d1a96284e916be3f165370f3500f09ccb9eb0748642a388156e52c853d495959f30a620a57af2b8c900871a854e03c5cd67b", @ANYPTR, @ANYPTR64, @ANYRES64=r3], @ANYBLOB="7d69e3c764844765c643e3a4088a9f720a781da839728a77cae2bfd5ee187acd4b47998f579a79a0cdf91dda84d7f0782e5411e788445294a69bd4ee1aacb04c8febd96dba68701310cbc5242c"], @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64=r2, @ANYRES16, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRESHEX, @ANYRESOCT=0x0]], @ANYBLOB="5af605b0a2dc69607fd213c6fcd17d40af9d9a0c00307abe2fb93c6349196477210807667d82ecdfbe692baba462161cb64f021ce1c50168eaf881d520444c2a679ada1146df31fd539a6616906a03278227f0e9d0e732c0cf3190354504653d897d74e12be4b5e4db18d14cabedc8559472830c8e7041137648d2d9ea417e0ba0adae", @ANYRESHEX], 0xe8) splice(r0, 0x0, r3, 0x0, 0x1, 0x0) [ 924.765142] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2302000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00460318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00810018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x5, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:38 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x8800) dup3(r0, r1, 0x80000) r2 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 925.483729] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00f00018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:39 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6416, 0x800) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f00000002c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, 0xff28) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e20, @multicast2}, {0x2, 0x4624, @multicast1}, {0x2, 0x4e20, @empty}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x10000f}) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0xffffffffffffffff, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000240)={0x5, 0x0, 0xb154, 0x3ff, 0x80}) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x7, 0xffff}, 0xc) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000200)=0x43ad, 0x4) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000180)={0x1, 0xa, 0x3}) setsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) 23:00:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x6, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00470318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="c00e000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 925.891426] kauditd_printk_skb: 228 callbacks suppressed [ 925.891441] audit: type=1400 audit(1550617239.294:33739): avc: denied { map } for pid=28873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 926.052191] audit: type=1400 audit(1550617239.304:33740): avc: denied { map } for pid=28873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)={0x1, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x10001}, {0x80, 0x2}, 0x0, 0x400000000001}) [ 926.229982] audit: type=1400 audit(1550617239.314:33741): avc: denied { map } for pid=28873 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 926.363313] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 926.384766] audit: type=1400 audit(1550617239.334:33742): avc: denied { map } for pid=28873 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:39 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000400)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000002c0)=0x1b, 0x4) setpriority(0x0, r0, 0x10000) prctl$PR_CAPBSET_DROP(0x18, 0x15) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) setxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000780)='security.capability\x00', &(0x7f00000007c0)=@v2={0x2000000, [{0x5, 0x200}, {0x7ff, 0x80000001}]}, 0x14, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x48c}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000004c0)={r4, 0xec, "1b6ea0837d3f2061105b35bd84fa22be9c4525b12b8b3f8a3dedb55bb8c22fc50a646bb01e4dc9da54b716ffd98f6297ae248b4ffa197e89933afd79db3ffd3a32752092987d583b1c20901bbcfab84cc8dcee45a15dc8d5b7539a2795b9f982a483d7126a29912c132b1aa84cc6c6e69a37f1adaf09327486e0526085e635e06f2276cdeecbb65215752a8102a7eb9fb9194f667bbb8350e093ff8605bf6ed1f9de087787a343ea028788d60013d0eeaf92185f1497d7221d46f131659ad8b98393de2e02e6dd5d98e8f46392e056121e0f66c659ee07437ab8de85f598f2d66dba38ecb3b4a072e97d34ff"}, &(0x7f0000000200)=0xf4) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) [ 926.617604] audit: type=1400 audit(1550617239.344:33743): avc: denied { map } for pid=28873 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x7, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 926.810424] audit: type=1400 audit(1550617239.404:33744): avc: denied { map } for pid=28873 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="e03f030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 926.986240] audit: type=1400 audit(1550617239.404:33745): avc: denied { map } for pid=28873 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:40 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x202041) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x402, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) getpeername$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @remote}, &(0x7f0000000300)=0x10) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000280)=0x8, 0x4) [ 927.201312] audit: type=1400 audit(1550617239.404:33746): avc: denied { map } for pid=28873 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.368019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=28914 comm=syz-executor.2 [ 927.407441] audit: audit_backlog=65 > audit_backlog_limit=64 [ 927.442592] audit: type=1400 audit(1550617239.424:33747): avc: denied { map } for pid=28873 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.642497] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=28920 comm=syz-executor.2 [ 927.659260] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00bb0518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x8, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000020008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="6e00002018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x7ffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0xfffffffffffffffc}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000140)={{0xfffffffffffffffd, 0x10001}, {0x80, 0x197}, 0x0, 0x6, 0x6}) 23:00:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 928.855749] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:42 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000200)={'stack ', '/dev/null\x00'}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x206000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x980, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000280)={{0x106004, 0x1d000, 0x3c0a110e57759d5a, 0x3f, 0x4, 0x71, 0x6f, 0x7, 0x8, 0x4, 0xc8c9, 0x4}, {0x5000, 0x0, 0xf, 0x5, 0x2, 0x8, 0x6c, 0x3, 0x3f, 0x8c02, 0x2, 0x2ada}, {0x4, 0x1f001, 0xf, 0x4, 0xfffffffffffffff7, 0x7f, 0x3ff, 0x3, 0xff, 0x100000000, 0xffffffff, 0x60000000}, {0xf000, 0x1001, 0xe, 0x1, 0x8, 0x1ff, 0x100000001, 0x0, 0x0, 0x6, 0x0, 0x4}, {0x3000, 0x10002, 0x1f, 0x9, 0x58e, 0x0, 0x3, 0x10000, 0x3, 0x1980000000000000, 0x8, 0x100}, {0x10000, 0xd000, 0xb, 0x20, 0x6, 0x928, 0x3f, 0x4, 0x7, 0x1, 0x80000001, 0x1ff}, {0x1, 0x1, 0x0, 0xae, 0x5, 0x31ca2cc, 0x3d2f, 0x20, 0xffffffffffffffff, 0x20, 0x3f, 0x8}, {0x4, 0x1, 0xf, 0xffff, 0x3, 0x2, 0x100000000, 0x5, 0xffffffffffffffc0, 0x0, 0x20, 0x100000001}, {0x100000, 0x1}, {0x100000, 0x2}, 0x0, 0x0, 0x3004, 0x10, 0x0, 0x1, 0x2000, [0x1000, 0x3f, 0x0, 0x7ff]}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r3, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x4004851) sendmsg$key(r1, &(0x7f0000f56000)={0xfbffffff, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}]}, 0x38}}, 0x0) 23:00:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x9, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffff8001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x8000) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20400) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000400)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) write$P9_RREAD(r1, &(0x7f0000000300)={0xe3, 0x75, 0x2, {0xd8, "df048d70313525a4c112456a126eb64e5b220b8561513558586beb58b78a674400ee575296bb9e7394a33e52b5e07ac71fddc91c95909f78e984f57cb2b7176cd009de3cb76b42f924be4017e997ee4d65b4d421c867a1d8cefca29c88da2f1ffeb5ace9031b6fb87278bfbb8e7f63ceb4d2d8a0c31971dceaddac8d8c7526375873dc9a0b4f447f100f747871534880857a420c39602530e37592f38d03c93345c5b335175b7648161f245a8ad340b98facc6ccc1a26e901c6f9cf2dc0412f70ea3032547ba4fdffc05c1b8d419a8aa7e5294cfa702dc9d"}}, 0xe3) [ 929.413268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=28958 comm=syz-executor.2 23:00:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="00f0ff7f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 929.638314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=28966 comm=syz-executor.2 [ 929.718068] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000a18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00020018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000040)={0x7fff, 0xa2f, &(0x7f0000000000)="eed707732099b9c3f2b4c9", &(0x7f0000000500)="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", 0xb, 0x1000}) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x68, r2, 0x2ff, 0x0, 0x0, {{0x1, 0x0, 0x3a1c}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00\x00\n\x00'}}}}, 0x303}}, 0x0) 23:00:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x208000, 0x0) write$capi20(r1, &(0x7f0000000040)={0x10, 0x6, 0x82, 0x83, 0xb7e, 0x20}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="effdffff18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 930.603099] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000c18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xc, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 930.909024] kauditd_printk_skb: 257 callbacks suppressed [ 930.909040] audit: type=1400 audit(1550617244.314:33973): avc: denied { map } for pid=28988 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.056975] audit: type=1400 audit(1550617244.374:33974): avc: denied { create } for pid=28987 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:00:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x400, 0x100000000}, 'port0\x00', 0x44, 0x40020, 0x1892, 0x1, 0x4, 0x1000, 0x9}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000001, 0xa000) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000040)={{0x40, 0x20, 0x1, 0x0, 0x9, 0x1}, 0x7}) [ 931.211525] audit: type=1400 audit(1550617244.374:33976): avc: denied { map } for pid=28999 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:44 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCFLSH(r0, 0x541b, 0x709000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) [ 931.398626] audit: type=1400 audit(1550617244.384:33977): avc: denied { write } for pid=28987 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:00:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000200008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 931.566600] audit: type=1400 audit(1550617244.384:33978): avc: denied { map } for pid=28988 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.695147] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00040018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 931.727816] audit: type=1400 audit(1550617244.374:33975): avc: denied { write } for pid=28987 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:00:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000e18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xe, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 931.924132] audit: type=1400 audit(1550617244.424:33979): avc: denied { map } for pid=28999 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'lo\x00\x00\x00\x00\x01\xff\xf3\x00', 0x0}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000001940)) prctl$PR_SVE_GET_VL(0x33, 0x18a5d) r4 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x905c, 0x60100) connect$packet(r4, &(0x7f0000000340)={0x11, 0x7, r3, 0x1, 0x4}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8923, &(0x7f0000000380)={'bpq0\x00\v\x00\x00\x00\x00\x00\x00\x00\xfa\xff\x00', r3}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) setreuid(r5, r6) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x1211}) r7 = fcntl$getown(r2, 0x9) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r7) [ 932.053024] audit: type=1400 audit(1550617244.424:33980): avc: denied { read } for pid=28987 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:00:45 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x101002) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, r1, 0x401, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x45}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xef8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x800, @ipv4={[], [], @remote}, 0x87af}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4fe}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}]}]}, 0x19c}}, 0x11) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 932.166705] audit: type=1400 audit(1550617244.424:33981): avc: denied { map } for pid=28999 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.274377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29033 comm=syz-executor.4 [ 932.339626] audit: type=1400 audit(1550617244.424:33982): avc: denied { map } for pid=28999 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.541964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29033 comm=syz-executor.4 23:00:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 932.922697] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00003f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x2000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3ff, 0x3, [0xfff, 0x0, 0xfff]}, &(0x7f0000000140)=0xe) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x332, 0xffffffffffffffff, 0x200000003f}, 0x1e0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x10, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 933.247735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=29057 comm=syz-executor.4 [ 933.354802] : renamed from bpq0 [ 933.422608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=29064 comm=syz-executor.4 23:00:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00004018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000010008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 933.781363] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00060018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x7f, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x7f, 0x3}, 'port0\x00', 0x24, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1000}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'L+', 0x4ff}, 0x28, 0x2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x0, 0x7}, {0x80, 0x10000000000000}, 0x0, 0x1, 0x4cc3}) socketpair(0x1f, 0x80000, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000140), &(0x7f0000000180)=0x4) 23:00:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x60, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:47 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103e, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000200)={0x9, 0xffffffffffffffff, 0xa236}) write$P9_RUNLINKAT(r3, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x4, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x20082, 0x0) [ 934.367926] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 934.570530] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:00:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00080018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00034618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/4) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)="bf50ef2ffc56dd077aba674f8e96", 0xe}], 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 934.888233] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x86, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 935.305696] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 935.480570] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:00:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x8, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000a0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00034718008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 935.916366] kauditd_printk_skb: 229 callbacks suppressed [ 935.916383] audit: type=1400 audit(1550617249.324:34212): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 936.084212] audit: type=1400 audit(1550617249.374:34213): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:49 executing program 3: 23:00:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xf0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 936.262682] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 936.324450] audit: type=1400 audit(1550617249.394:34214): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000000)={{0x30, 0xe815}, {0x1ff8, 0x2}, 0x800, 0x2, 0x8c}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 936.461378] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 936.530309] audit: type=1400 audit(1550617249.394:34215): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:50 executing program 3: [ 936.754606] audit: type=1400 audit(1550617249.434:34216): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000b0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00655818008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 936.897442] audit: type=1400 audit(1550617249.434:34217): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 936.923336] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) getuid() getresuid(&(0x7f0000000600), &(0x7f00000005c0), &(0x7f0000000580)) getgroups(0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0xee01, 0x0, 0xee00, 0xee01]) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() getgroups(0x1, &(0x7f0000000400)=[0xee01]) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {0x1, 0x3}, [], {0x4, 0x5}, [{0x8, 0x4, r1}, {0x8, 0x4, r2}, {0x8, 0x2, r3}, {0x8, 0x5, r4}, {0x8, 0x0, r5}], {0x10, 0x6}, {0x20, 0x1}}, 0x4c, 0x1) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r6, 0x5606, 0x100) 23:00:50 executing program 3: [ 937.128178] audit: type=1400 audit(1550617249.484:34218): avc: denied { map } for pid=29228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x300, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 937.296531] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 937.312990] audit: type=1400 audit(1550617249.544:34219): avc: denied { map } for pid=29228 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 937.413433] audit: audit_backlog=65 > audit_backlog_limit=64 [ 937.417636] audit: audit_backlog=66 > audit_backlog_limit=64 [ 937.513426] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:00:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00006018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000c0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 937.826238] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x346, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000140)='./file0\x00') symlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file1\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r3, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmmsg(r6, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) rename(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file1\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r8, &(0x7f0000000140)="38b435404c3255e8d922e07b9501773716c33ffb47052d5854d4e4964bab500003385f9f2459afd00d31538c62b2cc85dbedbabbe577a0c3806a0dfcc836608ab83315bbde4b76ee015eb1"}, 0x10) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000240)=0x4000, 0x4) 23:00:51 executing program 3: [ 938.461691] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 938.738086] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 938.822932] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:00:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00586518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x347, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:52 executing program 3: 23:00:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x10001}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = shmget(0x3, 0x4000, 0x1810, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000140)=""/52) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000040)={0x3, 0x2, 0x0, {0x80, 0x3f, 0x3f, 0x3}}) 23:00:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00100018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:53 executing program 3: [ 939.636769] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 939.775417] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:00:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x500, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 939.968975] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:00:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00008118008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:53 executing program 3: 23:00:54 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') write$P9_RREADLINK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="09803be217ed1ef6dd"], 0x9) 23:00:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00600018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 940.797192] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 940.928434] kauditd_printk_skb: 230 callbacks suppressed [ 940.928450] audit: type=1400 audit(1550617254.334:34440): avc: denied { map } for pid=29345 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 941.031358] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:00:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x600, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 941.146146] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 941.159678] audit: type=1400 audit(1550617254.374:34441): avc: denied { map } for pid=29345 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e02000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:54 executing program 3: [ 941.358313] audit: type=1400 audit(1550617254.374:34442): avc: denied { map } for pid=29345 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0005bb18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 941.506193] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 941.519901] audit: type=1400 audit(1550617254.374:34443): avc: denied { map } for pid=29338 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:55 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80200, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000140)) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='system.advise\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 941.701071] audit: type=1400 audit(1550617254.404:34444): avc: denied { map } for pid=29347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x700, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:55 executing program 3: [ 941.887557] audit: type=1400 audit(1550617254.404:34445): avc: denied { map } for pid=29347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00f00018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 942.076851] audit: type=1400 audit(1550617254.404:34446): avc: denied { map } for pid=29347 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$bt_bnep(0x1f, 0x3, 0x4) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='binfmt_misc\x00', 0x82, &(0x7f0000000240)=').]+em0wlan1\x00') 23:00:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000f018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 942.145718] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 942.260194] audit: type=1400 audit(1550617254.404:34447): avc: denied { map } for pid=29347 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:55 executing program 3: 23:00:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x900, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 942.448112] audit: type=1400 audit(1550617254.414:34448): avc: denied { map } for pid=29338 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.649752] audit: type=1400 audit(1550617254.444:34449): avc: denied { map } for pid=29345 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e04000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00620218008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:56 executing program 3: [ 943.237554] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:56 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x2, 0x3, 0x9}) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x9, 0x4) r2 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:00:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xa00, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000200008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e05000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:57 executing program 3: 23:00:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) [ 943.895365] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 944.035473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29426 comm=syz-executor.1 23:00:57 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103e, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000200)={0x9, 0xffffffffffffffff, 0xa236}) write$P9_RUNLINKAT(r3, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x4, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x20082, 0x0) 23:00:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xc00, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e06000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x800) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9) 23:00:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00460318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xe00, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:00:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e07000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2080, 0x0) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000040)=0x400) socket(0x8, 0x5, 0x0) [ 945.200820] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00470318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 945.358406] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=29494 comm=syz-executor.1 23:00:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 945.571972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=29554 comm=syz-executor.1 23:00:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e08000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:59 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103e, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000200)={0x9, 0xffffffffffffffff, 0xa236}) write$P9_RUNLINKAT(r3, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x4, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x20082, 0x0) 23:00:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:00:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x400000000000000, 0x4}, {0x80}, 0x0, 0xfffffffffffffffe}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000300)={0x2, 0x3, 0x6, 0x0, 0x3}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x207f, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x20, 0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000080)={0x9, r3}) getsockname(r1, &(0x7f0000000380)=@isdn, &(0x7f0000000180)=0x80) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x8001, 0x200}, {0xb5b6, 0xbb54}, 0x6, 0x3, 0xffffffffffffffe1}) statx(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)) [ 945.957774] kauditd_printk_skb: 227 callbacks suppressed [ 945.957789] audit: type=1400 audit(1550617259.364:34641): avc: denied { map } for pid=29581 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 945.960308] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:00:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 945.997880] audit: type=1400 audit(1550617259.404:34642): avc: denied { map } for pid=29581 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.145731] audit: type=1400 audit(1550617259.404:34643): avc: denied { map } for pid=29581 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.359207] audit: type=1400 audit(1550617259.404:34644): avc: denied { map } for pid=29587 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:00:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4603, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 946.482862] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 946.542291] audit: type=1400 audit(1550617259.404:34645): avc: denied { map } for pid=29587 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.563972] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 946.759613] audit: type=1400 audit(1550617259.404:34646): avc: denied { map } for pid=29587 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00430518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 946.896566] audit: type=1400 audit(1550617259.404:34647): avc: denied { map } for pid=29587 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0a000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 946.924177] audit: type=1400 audit(1550617259.434:34648): avc: denied { map } for pid=29581 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.952133] audit: type=1400 audit(1550617259.544:34649): avc: denied { map } for pid=29591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.978819] audit: type=1400 audit(1550617259.594:34650): avc: denied { map } for pid=29591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.024508] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x5, 0x0) mq_timedreceive(r0, &(0x7f0000000200)=""/196, 0xc4, 0x20, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x7c}, 'port0\x00', 0x0, 0x40000, 0x7fffffff, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r2 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)='\x00', 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x3ff) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006480)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000006580)=0xe8) sendmsg$xdp(r0, &(0x7f00000068c0)={&(0x7f00000065c0)={0x2c, 0x2, r3, 0x14}, 0x10, &(0x7f0000006880)=[{&(0x7f0000006600)="fc00659a2c93237274903acc9516885e7026baca2de360e5f0f18594b67965b512facb123b57b65f4e68f2d7d70163b83a1b2ddc6b48d259bac3f0146e3504f0915cf191a6f36188897370c29d13619974af62d277fe01eda079d3c42fa9cd8973831d00a63b70d7f7be62446661f2c72788381fdc45e269440a83b052e7b5a91f2d824851270ece001b27060521f8f7b16a7ff02672feef6408795583b945b436905b560033946cde2f6ea5d25e30bc23925b31955415c49523b9c0d11d194d9436bcbc9b5877c45991", 0xca}, {&(0x7f0000006700)="c5eb6224083ea3c1d99037418c4d84816201605c5d009617f6c2dd21988666da99d725a78ba5a73effc6647fdac455dccc30c896dd113b2095795c5687932aac1e910a8e91", 0x45}, {&(0x7f0000006780)="b147f2e94af3e22767dda39969b8a6a55bd57c0b9ccf1b09ed3db5e5cd1f077e743dbee03822d17b513b350680a3d75e0530d26337757c1e3a04f30a7213b355ce08d3dca62ae0f893a252a0e4cc2cd616887fbbaa20cef79d0c2a32ba38442456ac5a3f7586dc95ba39fa3f0bfee4ffd5f766717d10987ff89af18c0db35aa01206e7c6ac926d216b6ffd32c815d040a898c1f5a8", 0x95}, {&(0x7f0000006840)="a73ae9c8c800bf49fc4bbd", 0xb}], 0x4, 0x0, 0x0, 0x4000}, 0x10) 23:01:00 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103e, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000200)={0x9, 0xffffffffffffffff, 0xa236}) write$P9_RUNLINKAT(r3, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x4, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x20082, 0x0) [ 947.155549] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0b000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4703, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 947.376027] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:01 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x7, 0x1) mknodat(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000140)='/dev/snd/seq\x00', 0xd, 0x1) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) getresuid(&(0x7f00000006c0)=0x0, &(0x7f0000000700), &(0x7f0000000740)) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x6, 0x4, &(0x7f0000000640)=[{&(0x7f00000003c0)="807414b3cebc62cc814bcaa52ef3347c25d1f3890400f46f0d404779407d641672bff681f213785baff90f37fc7971413fd7475c531e24fecc739cdab6fac2314d5dddf87373166de86a2cd22fb12962917ece84e92c4d7d9e5a4e019b8f5b376f2f808304e4ac959a8cce4295393ac96d44a6d931ae6de6c8a7fab9d4437bc9b92b31f4c8386af8b491e59c0a73f41f1b4995341c6b90907c101e18c3e4e8562204206891ae55a31ee7582e0f73ae1f8b6bc16a6ba6c3d6126156e4f5cbcc3b416c307b93c4d7102f2854c20679e2d46fa00dada33416d101a1c125fc49928544c260d1325dc0c71a5aba0d93893f2aca1e8c811ac13d41baa6", 0xfa, 0x7fffffff}, {&(0x7f00000004c0)="d351c49203c5241d087bcaf44f4f5d40457c65997307", 0x16, 0x2}, {&(0x7f0000000500)="a7d1f084949291d6dba3f28e6c2ac757f89a27d4258b7c31015454e5b30815415c48c4851239ec44054be8da989633e502c8af192d79f4ba4446705ca492e89edeb0b8d277f39e6130f42956d57736851768c222d5a5c878c171a257c250e45b9865e2b2036469a52bedfda71413b802a54fe56aee074368dcb466dd027cf005b89a423025a87844eb1d2324008a917bc3446f9065c3766b745f8ff0ef051cc31b9613fc53336fc4955c5da2a15c40910a436d415c53598cb0e9c982aca2e4d982ee13590fb269", 0xc7, 0x8}, {&(0x7f0000000600)="649084b35b5dbd568b82ad4a7bc9b339bf2832eed5fcb5957d9d64092f5ed859f554f3901eb71806c325", 0x2a, 0x3}], 0x2160000, &(0x7f0000000780)={[{@resize_size={'resize', 0x3d, 0x6}}, {@noquota='noquota'}, {@usrquota='usrquota'}], [{@fowner_gt={'fowner>', r2}}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={0x0, 0xee5}, &(0x7f0000000280)=0x8) openat$urandom(0xffffffffffffff9c, &(0x7f0000000800)='/dev/urandom\x00', 0x121080, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={r3, 0x1, 0x10, 0x4, 0x5}, &(0x7f0000000300)=0x18) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x4, 0xfffffffffffffffd}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 948.114302] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0c000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x5865, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000a18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 948.646644] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 948.851959] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(r0, r0) connect$pptp(r1, &(0x7f0000001340)={0x18, 0x2, {0x3, @empty}}, 0x1e) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f0000001200)=[r3, r4]) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001240)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000001280)) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f00000012c0), &(0x7f0000001300)=0x8) sched_setaffinity(r2, 0x8, &(0x7f0000000040)=0x40) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096, 0x1000) [ 949.075200] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0e000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x6000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:02 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000b18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 949.779945] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 949.953269] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:01:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000010008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x0, @tick=0x2, 0x5, {0x20000000000}, 0x60}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 950.116974] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 950.272279] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0f000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000c18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x6558, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 950.979468] kauditd_printk_skb: 199 callbacks suppressed [ 950.979484] audit: type=1400 audit(1550617264.384:34850): avc: denied { map } for pid=29901 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.035645] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 23:01:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$swradio(&(0x7f00000003c0)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x401, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x8, 0x4}, 'port0\x00', 0x8, 0x20000, 0x1ff, 0x7cb, 0x6, 0x12, 0x200, 0x0, 0x0, 0x1}) [ 951.150123] audit: type=1400 audit(1550617264.404:34851): avc: denied { map } for pid=29901 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.171195] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:01:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000fb5ff0), 0x0) [ 951.235166] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000e18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 951.333306] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 951.353060] audit: type=1400 audit(1550617264.434:34852): avc: denied { map } for pid=29901 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e10000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x8100, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 951.489947] audit: type=1400 audit(1550617264.464:34854): avc: denied { map } for pid=29901 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x4a, 0x5}, {0x8, 0x3f000}, 0x7fffffff, 0x1, 0x8}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 951.697176] audit: type=1400 audit(1550617264.464:34853): avc: denied { map } for pid=29898 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:05 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00003f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:05 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001480)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockname$ax25(r1, &(0x7f0000000080)={{0x3, @bcast}, [@bcast, @rose, @null, @bcast, @bcast, @bcast, @default, @rose]}, &(0x7f0000000100)=0x48) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0x32) r2 = dup2(r0, r0) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000040)) epoll_create1(0x80000) ioctl$IMADDTIMER(r0, 0x80044941, &(0x7f0000001140)) [ 951.963947] audit: type=1400 audit(1550617264.464:34855): avc: denied { map } for pid=29901 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.978457] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 952.098795] audit: type=1400 audit(1550617264.474:34856): avc: denied { map } for pid=29901 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 952.270096] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 952.289603] audit: type=1400 audit(1550617264.484:34857): avc: denied { map } for pid=29901 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e60000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 952.379030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 952.407731] audit: audit_lost=506 audit_rate_limit=0 audit_backlog_limit=64 23:01:05 executing program 3: r0 = msgget(0x0, 0x250) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)=""/211) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x5, &(0x7f0000000040)=0x74, 0x285) [ 952.426524] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000218008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:05 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x4080}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x8c900, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000180)) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) 23:01:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00004018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x8600, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2ef0000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x88, 0x400002) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000040)={0x9, {0xfff, 0x101, 0x6, 0x10001}}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r2, 0x5}}, 0x10) 23:01:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000418008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00054318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 953.507542] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xf000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 953.988923] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 23:01:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2ed8010018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x5, 0x10001}, {0x84}, 0x0, 0x1}) 23:01:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x10800, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x3, 0x4) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, &(0x7f0000000440)={[{@mode={'mode'}}]}) 23:01:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00034618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 954.666392] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1, 0x6}) 23:01:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:08 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5404, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0xac200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x2f28000000000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r3, 0xfff}, 0x8) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80000, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x400, 0x0) write$P9_RLERROR(r5, &(0x7f0000000940)=ANY=[@ANYBLOB="170000000002000e040010726f75702dbc857455c7d094a600002f6b8f6615eaa00e311a9d3c793474f81a143f64daecd9b7e7dcea001bef761382028cb52198f90b6dc570c2ab151b181974417b99c1066ae939c9b05a49b5567b393a12b92d7b227985cfc2177b5b2535b122cb0f58000c61c3c0e012e4de1858f6493289fae6d61b8723d3a15c1621bbb2c11bf69917ecd1b27996b2b093408052244b29d74f17ec2e27da1a87b47bcba5540d0a40aa7e7423a8893b18b578d097124cbf6f7c2852fb4b79efd2a7dfd411b5b3026990ef67e9e9071d0036997378f55d9b82311e34e7a6e3e70000ac8ccc230470ba529614bb77aab9178274e19bebdc92630633374e1dc1bc10bdc595c27fb2218344fad0fe620e3549666f0a5a269c1b712fad03588680ff733a21ccf9489a2aaf3acd479d46e56dcf641698ff845d3dca8e74eab29d2ee6d8544b35c96b3dfcdfc50f7bc96450a181cdf851f2c832c2fc3d57e01690d129f3e0497437ec42606be773aaa0a155a329a09a722c15c56132934c27b6a079aada3769a96eb99af37db69e496cc2825e9fefc130e580feb0d60a7526bbbae2c826164a6afe84f5dc9f98421f2849b2294872151ab901811a087ecc58cdb45e845f92dbdcb2f5a8f0f20a6541bc1d4ed5336de4bb7a8ee536d77c146b86dc2f1feff41879fdf9b4c4cdd598ee2065ed5e20076668242b5e069bf2bdd36f2e8d73bfd1704d2539002a9000e5ca8a096b529c7974fbd1fab277d28d67591e5f18c9b5288a92b7d7cb07d4b7892ebe67b7c23ab433b1dbb8be3d8abcadf7b4ccc30349c6a38d552141ee92048edee9115ade6396bba993c61eaedc905056a72304522a29b45b04d434e207c1629be38212c0fb8620278a444b6456f180681a1c54abc60b3ef0d060bd5aa399b54208c0abba49f8d820341e241e2e633b953231960a8cca5553b650b8ed5d6b05acb863cf29546f75327b2591e438e2ff4be560b657f23bffe8c09e78c7c74dfdd2c55e18ab1e739a57726c74746341897fda20f0cdbccb16242b44b3f176df8af56462a902a46162b4e684a1e7778beee01573061b5217d53013c44b7c2a59296e7584f5fc96170c03116dd2995c8bc0abdd63042a6c42eb75d8bec53629b66a0b0ba8651a6e325f869f94"], 0x17a) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f0000000280)={@mcast1}, &(0x7f00000002c0)=0x14) mkdir(&(0x7f0000000340)='./file1\x00', 0x11) epoll_wait(r5, &(0x7f00000003c0)=[{}, {}], 0x0, 0xfffffffffffffff9) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000180)=0x8000100042, 0x2b0) getgroups(0x2, &(0x7f0000000080)=[0x0, 0xffffffffffffffff]) getgid() getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x10000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$llc(r6, &(0x7f0000000380)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffff1, 0x40) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 23:01:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xf0ffff, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00034718008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e46030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 955.838155] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 955.986056] kauditd_printk_skb: 214 callbacks suppressed [ 955.986071] audit: type=1400 audit(1550617269.394:35071): avc: denied { map } for pid=30037 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x1000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00655818008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 956.180815] audit: type=1400 audit(1550617269.394:35072): avc: denied { map } for pid=30037 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 956.305995] audit: type=1400 audit(1550617269.454:35073): avc: denied { map } for pid=30038 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000818008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 956.534139] audit: type=1400 audit(1550617269.504:35074): avc: denied { map } for pid=30038 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 956.741311] audit: type=1400 audit(1550617269.524:35075): avc: denied { map } for pid=30037 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:10 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) r3 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e47030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:10 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5404, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0xac200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x2f28000000000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r3, 0xfff}, 0x8) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80000, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x400, 0x0) write$P9_RLERROR(r5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x17a) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f0000000280)={@mcast1}, &(0x7f00000002c0)=0x14) mkdir(&(0x7f0000000340)='./file1\x00', 0x11) epoll_wait(r5, &(0x7f00000003c0)=[{}, {}], 0x0, 0xfffffffffffffff9) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000180)=0x8000100042, 0x2b0) getgroups(0x2, &(0x7f0000000080)=[0x0, 0xffffffffffffffff]) getgid() getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x10000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$llc(r6, &(0x7f0000000380)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffff1, 0x40) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) [ 956.848803] audit: type=1400 audit(1550617269.524:35076): avc: denied { map } for pid=30037 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.012658] audit: type=1400 audit(1550617269.584:35077): avc: denied { map } for pid=30053 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.141126] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00006018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 957.227459] audit: type=1400 audit(1550617269.604:35078): avc: denied { map } for pid=30053 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.373389] audit: type=1400 audit(1550617269.624:35079): avc: denied { map } for pid=30053 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x2000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000a18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 957.559604] audit: type=1400 audit(1550617269.644:35080): avc: denied { map } for pid=30053 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x78d, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = semget$private(0x0, 0x2, 0x2) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f00000012c0)=""/4096) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000200)=""/167) 23:01:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00026218008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 958.356714] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2ec7050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000c18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x3000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80080}, 'port0\x00', 0x2}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00586518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 959.285900] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:13 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x40080, 0x0) fstatfs(r0, &(0x7f0000000200)=""/119) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = inotify_init1(0x800) readv(r2, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/132, 0x84}], 0x1) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80080, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3, &(0x7f00000000c0)="39f5e40bc3e50322cc373f048b86c9cd1a5069e5cfff9ed3d67c0184a9231974999ed782cf5d47c6fdd4dd3a84d366013bc16ebcd673f8591e29171c3f19166ff45e96415f1275d67166d1165852f3976cc7f6a3a2f0bcaaf9d39b8f02eb522993e99b99a07a9b1a4d42e8727daac163eca5f132d3bff87d922614028e62300834a94848ed52a9e987da5931e26645fe3345512a9d3417aa470dbef421eec9c2e3a0648d2bf412871c25cda6082bbebec5ccbb35ac4fb63f8ea1848395a357825b9bfdc2d23b90d43919c32805fc65f4bfdd648d"}, 0x10) close(r2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) tkill(r1, 0x1000000000016) 23:01:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00060018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x400000000000015, 0xfffffffffffffffd}) r1 = accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000140)=0x800, 0x4) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000280)) r3 = creat(&(0x7f0000000180)='.\x00', 0x108) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf0, r4, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x84de}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffc68}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e89}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffeb7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x54}, 0x24008000) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000004c0)) 23:01:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000e18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00008118008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 960.206973] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x10400) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00070018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x5000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00001018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000f018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x400}, 'port0\x00', 0x0, 0x0, 0x8, 0xbe92}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:14 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000040)=0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x8400) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000380)={0x300000000000000, 0x0, 0x0, 0x20000, 0x0, r0, &(0x7f0000000240)="e1", 0x1}]) 23:01:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000a0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 960.991499] kauditd_printk_skb: 192 callbacks suppressed [ 960.991513] audit: type=1400 audit(1550617274.404:35273): avc: denied { map } for pid=30456 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 961.099059] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 961.188903] audit: type=1400 audit(1550617274.404:35274): avc: denied { map } for pid=30456 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x6000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 961.358626] audit: type=1400 audit(1550617274.404:35275): avc: denied { map } for pid=30456 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:14 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x7f}, 'port1\x00', 0x8, 0x0, 0x1, 0xfffffffffffffffd, 0x7}) 23:01:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000200008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 961.554528] audit: type=1400 audit(1550617274.404:35276): avc: denied { map } for pid=30456 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00006018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 961.769097] audit: type=1400 audit(1550617274.404:35277): avc: denied { map } for pid=30456 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 961.953138] audit: type=1400 audit(1550617274.484:35278): avc: denied { map } for pid=30456 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000b0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 962.122996] audit: type=1400 audit(1550617274.484:35279): avc: denied { map } for pid=30456 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.231119] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 962.247995] audit: type=1400 audit(1550617274.524:35280): avc: denied { map } for pid=30456 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:15 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x7000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 962.479579] audit: type=1400 audit(1550617274.544:35281): avc: denied { map } for pid=30454 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.524542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30499 comm=syz-executor.2 [ 962.525784] audit: audit_backlog=65 > audit_backlog_limit=64 [ 962.620421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30502 comm=syz-executor.2 23:01:16 executing program 3: socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev_mcast\x00') setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000880)={{0x6c, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e22, 0x3, 'wlc\x00', 0x1e, 0x7, 0x33}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x1, 0x4, 0xd6, 0xffff}}, 0x44) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/116, 0x12}], 0x1, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000140)="c0068a5c80c51073059ef2f664b00a564e3cf591aa", 0x15, 0x8}, {&(0x7f0000000180)="398ecf09da77eb6b0588ae01e542f7335ac2f8fbf2fbe045c22843742fc47b5e712d52b0f6520a659ce60db7200cce9b76e276b8f1714a30a8bfb0d7291d0a007272349a047f8387d60f78b4ec1b62b176eeee046157ce0c701103b6f2c2dc4422907361a4d7fd733e42c93c6b018d653f8e372d3cb4222f097f4da538fa97c27d16e592cbcf01dc97bb2c5c988a424b00f6621314a9d179237819fea01e61a6b6723432de4ab2c22e5527097adcb933cdbc8726ada937f763dd75ff68c1efe8d75871a82ec56cca4e25d4849c581d291be8d99e9120aa", 0xd7, 0x3}, {&(0x7f00000002c0)="a5c2a14d0eaf3aa39bb0029555271e356fa9bc6ce3cebfb9d925eb82b0629c99888e8f", 0x23, 0x2}, {&(0x7f0000000300)="04276d63032f70b3090d4dc7866c9d006e94ebdf091aec407b4715a2e57ad53976a48f8873620acd880f616a5a3e5fc95abdd4d67a03ad3229a1d6883f0e9718d6b1eb6e95efe9c6361fc1ebda9321080b6bb2cf3647b6607348297fd89a709134760e68aab19f40d1c5b82ea8e74ca72f060d9cff97ac9392268c0c3c7d2c8128f69a2823c22872031241f643aac82c3a54085ab93bfbb7ac79e443ac4e36270678af8d5540b0233f338c532f2a8749678424d0e65a594ee817e27844e99acf4d934da457cd2bee7db4cc68a536cb015343f2a1c3bec8fdbbf7edb0d280", 0xde, 0x6}, {&(0x7f0000000400)="7dce5511d00a8b2abdcd655142411790e81d5c314447b689b5980c77d277d7b3adee11a2f06df23e5daf20df23c38abfbe8e821aaf454f4883d9e4053edf1926367ada3cb5ab47d7c466133caa2b572f267c", 0x52, 0xc3}, {&(0x7f0000000480)="8e6a30da756df912e333f825c5359f41db79502e3a57c6235405289c62c6ff2690b96d97122e7b10236b441b7ab8e032ba77ea3d2d260f106d2375af80b24de98e3cbd2da9cd32227608de7e7d86add541d8cdc4462dc29be538ad4675c6319f3bb308f4751bec71a59b7d459a7b5aa6390a2ea24f3185d3b4b394312a2c9dc58c31c18fd273bf99dc1f451f2c6718a34f9b38869eef90a80562469837a61363bc7fa08b2c050ac9f31e0a0259a3f9957ddcaff322b32484c84503e9d5dc80fbba794bbcf44a1beb18b96af560c1adfbeaedd1e099a396c66a14989bb7aa27fe", 0xe0, 0x9}, {&(0x7f00000005c0)="aa6bf34ed66ff398636b24259a3dcbf81c284a64e5ea727468a891d24a8c9ed03941a468e3db490a86633fcdcd74fefb89170dd968c14413a46949dd535daa0acf31a2ccaf0900c76dba7c9877b2fe6ff758380e299550f257d64aff5da038f3981fcf8ed0ede07ca7a66213383057005cc44c911e8c149e84862c4763b32ff4f9baa72388d996ce3d0aed823f3c2c7c5fb9cf1b56e00b0d8f1c4772d853ee7256986de13c1977d4cccc99cdc0277e0751bf692c819c58e9419aeac45c49c76194bb4658894200d24db7c5da59c627bdb743d862b75090cb000d2d690534d2d763b8559832135c", 0xe7, 0x1c}], 0x1000, &(0x7f0000000780)={[{@usebackuproot='usebackuproot'}, {@notreelog='notreelog'}, {@autodefrag='autodefrag'}, {@nospace_cache='nospace_cache'}, {@compress_algo={'compress', 0x3d, 'zlib'}}, {@check_int='check_int'}, {@nospace_cache='nospace_cache'}, {@barrier='barrier'}, {@metadata_ratio={'metadata_ratio'}}, {@subvolid={'subvolid', 0x3d, 0x9}}], [{@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 23:01:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000c0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000140)=0x4) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 963.143049] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x8000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 963.399116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=30527 comm=syz-executor.1 [ 963.436285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=30526 comm=syz-executor.2 [ 963.600511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=30535 comm=syz-executor.2 [ 963.621254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=30534 comm=syz-executor.1 23:01:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000020008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 963.876498] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:17 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x9000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:17 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x04\x01C\x9foH\xbaz\x00\x00\x00\x00\x00\x00\x00\x00', 0x13, 0x2) 23:01:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000f0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 964.598204] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 964.683024] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:01:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20180, 0x0) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 964.926699] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:18 executing program 3: openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x4000) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe02, 0x8, 0x0, 0x2ed) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000200)=""/116, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") ioctl$KVM_RUN(r3, 0xae80, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:01:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xa000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e003f0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 965.303301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=30673 comm=syz-executor.1 [ 965.473054] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 965.520008] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=30689 comm=syz-executor.1 23:01:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000180)=0x4000000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 965.598686] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 965.741767] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xc000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 966.040141] kauditd_printk_skb: 247 callbacks suppressed [ 966.040156] audit: type=1400 audit(1550617279.454:35512): avc: denied { map } for pid=30691 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 966.339603] audit: type=1400 audit(1550617279.454:35513): avc: denied { map } for pid=30692 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00400018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 966.476699] audit: type=1400 audit(1550617279.494:35514): avc: denied { map } for pid=30691 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000200)=0x5da) 23:01:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 966.622524] audit: type=1400 audit(1550617279.494:35515): avc: denied { map } for pid=30692 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 966.699708] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 966.796361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=30809 comm=syz-executor.1 [ 966.810431] audit: type=1400 audit(1550617279.494:35516): avc: denied { map } for pid=30692 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 966.822626] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:01:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xe000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 966.981663] audit: type=1400 audit(1550617279.944:35517): avc: denied { map } for pid=30776 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.045515] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=30813 comm=syz-executor.1 23:01:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 967.115591] audit: type=1400 audit(1550617279.944:35518): avc: denied { map } for pid=30776 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000010008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 967.289731] audit: type=1400 audit(1550617279.984:35519): avc: denied { map } for pid=30776 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:20 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x20000) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x5, {0x101, 0x1d, 0x6, 0x1, 0x7, 0xa80}, 0x75f4, 0x4}, 0xe) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280), 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x34, "d38aa64902f610e96a5762640cc0d44c2ece55564f589a27ce48c00e234adfa3b286a0b481f06924339b67d0bfc3db2ab82cc549"}, &(0x7f0000000200)=0x3c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r2, 0xff}, 0x8) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000000)=0xffffffffffff0000) 23:01:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03460018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x10000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 967.488106] audit: type=1400 audit(1550617280.004:35520): avc: denied { map } for pid=30776 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x600000, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)=0x1) [ 967.727160] audit: type=1400 audit(1550617280.004:35521): avc: denied { map } for pid=30796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.757931] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 967.870908] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:01:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 968.260480] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e03470018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 968.400528] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 968.460195] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x14, 0x80100) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x0, @remote, 0x4e24, 0x3, 'lc\x00', 0x20, 0x7fff, 0x2}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000001200)={0x0, @reserved}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) connect$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0x3, 0xa1, 0x3f, 0x7, 0x800, 0xfffffffffffffff7}, 0x9e}, 0xa) 23:01:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:22 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000000)) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x44000, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000080)=0x1000000) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000240)={0x0, 0x7530}, 0x10) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0xf2, 0x4c, @buffer={0x0, 0x2f, &(0x7f0000000280)=""/47}, &(0x7f00000002c0)="12714d9d646c895c9958bf157c4a2f1a17b436e942e6a62e61a1069492037721dd03a56722387046213c430fa11521cc8ab1e285db8dc704013177413f227fa82281176eafb991de501d0426bf4508415bd21e1386a588894d165b79069b968778135d8ef03b2b8243c7fad102e32a52a07964ae145ac09f936c9c9b8654c5335fe725b13c4292337ac3209658c4955bbe7359009ec390b795c5ac82e02a432374e0a4ce93d0bb76df2a4aaf555425d7c637326aa6e24e9a647ee334d723d66492a47e4ed4da215ee44db9b4f3b579601ebf6474896e95ff27517809b0d5c166069c05e4cd6dde12be576f3f06b2deb390b9", &(0x7f00000003c0)=""/47, 0x8001, 0x0, 0x0, &(0x7f0000000400)}) select(0x40, &(0x7f00000000c0)={0x3ff, 0x75b, 0x200, 0x7, 0x8, 0x7f, 0x0, 0x1}, &(0x7f0000000100)={0x20c, 0xffffffffffffffd2, 0x8000, 0x100000001, 0x3, 0x81, 0x1, 0x8}, &(0x7f00000001c0)={0x0, 0x100000001, 0xfffffffffffffff8, 0x8, 0x4, 0xffffffff, 0x3a, 0x1f}, &(0x7f0000000200)={0x77359400}) [ 968.637638] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:01:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x40000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 968.788192] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:01:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x64e5, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) 23:01:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e65580018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 969.229292] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x100000000002, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x4b, &(0x7f0000000300)={{{@in6=@remote}}, {{@in6=@rand_addr="3046ee16ef22e1e6e54a772cee5a7086"}, 0x0, @in6=@local}}, 0xe8) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) [ 969.373192] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 969.473035] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x46030000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 969.669073] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 969.821782] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:01:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00600018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x43, 0x3, 0x3}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 969.927575] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000218008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 970.109338] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 970.270656] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x47030000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:24 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x5, 0x80000000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0xc3, "38912b209ee615a25ca43a0b2c1ca6a0f56eff3bb978d09781b36bdb9e2c1977ae9085d201bb38fec1b75fdea1a24f94c5a292c128d69318e2d9d29600a9ad0189af1e65e7b65e198f0a76763e7cbb769ac6a8e200af8e8cf031ea3f2ae3790c2d69b08f98eb0ac20339ce2e287db593c68147fa464444381d01e8a481782ab6d4e84b80809abb0832ef2e5af02a1f05edff57b5258447b156b4e221873b54e3bf218f19e4b142c38afde524b245d172e4be87ea7cecbcd1c8ef0c942384f3e4a34d0c"}, &(0x7f0000000240)=0xcb) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000280)={r3, 0x3ff, 0x30, 0x5, 0x6}, &(0x7f00000002c0)=0x18) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000009c0)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000400)=""/115, 0x73}, {&(0x7f0000000480)=""/230, 0xe6}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000680)=""/108, 0x6c}, {&(0x7f0000000700)=""/229, 0xe5}, {&(0x7f0000000800)=""/104, 0x68}], 0x7, &(0x7f0000000900)=""/167, 0xa7}, 0x2040) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in=@multicast1, 0x4e21, 0x3, 0x4e21, 0x3, 0xa, 0x20, 0x80, 0x67, r4, r5}, {0x7fffffff, 0x400, 0xffffffff80000000, 0x3ff, 0x75, 0x0, 0x5, 0x7}, {0x7, 0x1, 0x1f, 0x3}, 0x71f0491, 0x6e6bb7, 0x2, 0x0, 0x0, 0x2}, {{@in6=@rand_addr="2c6522954f64cb4b97de35e6d00ad139", 0x4d6, 0x2b}, 0x2, @in6=@local, 0x3507, 0x3, 0x3, 0xf6, 0x401, 0x5, 0x3ff800000}}, 0xe8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r7, 0x0, 0x8ec0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000040)) write$P9_RFLUSH(r7, &(0x7f0000000000)={0xffffffffffffff8d}, 0x33b) close(r1) 23:01:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) [ 971.049995] kauditd_printk_skb: 206 callbacks suppressed [ 971.050010] audit: type=1400 audit(1550617284.464:35728): avc: denied { map } for pid=31002 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 971.143081] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 971.275131] audit: type=1400 audit(1550617284.494:35729): avc: denied { map } for pid=31002 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 971.288614] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e58650018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 971.421783] audit: type=1400 audit(1550617284.534:35730): avc: denied { map } for pid=31013 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x8040) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x0, 0x10001}, {0x8}, 0x0, 0x6}) [ 971.464727] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 23:01:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x60000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 971.614802] audit: type=1400 audit(1550617284.534:35731): avc: denied { map } for pid=31013 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00810018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000418008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 971.789966] audit: type=1400 audit(1550617284.534:35732): avc: denied { map } for pid=31013 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20002) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000200)) r2 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001480)=0xe8) time(&(0x7f0000001840)) fstat(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001600)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000001800)={&(0x7f00000002c0), 0xc, &(0x7f00000017c0)={&(0x7f0000001640)={0x15c, r5, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffe1}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1c0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8f9f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000000}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7653}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1b}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) sendmsg$unix(r1, &(0x7f00000015c0)={&(0x7f0000000240)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001340)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="9711d4fe7fd16e1d", 0x8}], 0x3, &(0x7f0000001540)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x60, 0x80}, 0x40004) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffffffffffd, 0x0, 0x800}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x1}) write$P9_RSYMLINK(r0, &(0x7f0000001880)={0x14, 0x11, 0x1, {0xb, 0x0, 0x2}}, 0x14) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) connect$bt_rfcomm(r6, &(0x7f0000000040)={0x1f, {0x4, 0xfffffffffffffffc, 0x3, 0x10001, 0xffffffffffff7fff, 0x40}, 0x30}, 0xa) connect$pptp(r6, &(0x7f0000000180)={0x18, 0x2, {0x3, @local}}, 0x1e) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f00000001c0)={0x9, 0x800}, 0x2) [ 971.953025] audit: type=1400 audit(1550617284.584:35733): avc: denied { map } for pid=31013 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {}, {0x2, 0x0, @local}, {0xffffffffffffffff, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='lo:\b\x00\x06\x00\x10\x00\x00\x04\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000140)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f0000000240)={0x90, 0x0, 0x4, {0x3, 0x3, 0xb0, 0x0, 0xfff, 0x0, {0x6, 0x200, 0x4f, 0x7f, 0x200, 0x7, 0x400, 0x5, 0x1000, 0x30000, 0xff, r2, r3, 0x81, 0x8000}}}, 0x90) [ 972.108028] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 972.127259] audit: type=1400 audit(1550617284.584:35734): avc: denied { map } for pid=31013 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x65580000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 972.294737] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 972.340745] audit: type=1400 audit(1550617284.634:35735): avc: denied { map } for pid=31013 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 972.529993] audit: type=1400 audit(1550617284.634:35736): avc: denied { map } for pid=31013 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.713893] audit: type=1400 audit(1550617284.644:35737): avc: denied { map } for pid=31021 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e05c70018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 972.920639] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 973.031541] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:01:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x81000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 973.187093] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:01:26 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x400, 0x4) ioctl$IMDELTIMER(r1, 0x80044941, 0x0) 23:01:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e01d80018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x1c0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000020000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000008060300736630000010000000000000000064756d6d793000000000000000000000696662300000000000000000000000006c6f0000000000000000000000000000ffffffffffff000000000000ffffffffffff0000000000000000d0000000d0000000000100006172700000000000000000000000000000004000000000000000000000000000380000000000000000000000000000009ff70001000000007f00000100000000000000000000000000000000aaaaaaaaaa00000000000100000000000000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff00000000"]}, 0x238) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000540, 0x0, 0x0, 0x20000570, 0x200005a0], 0x0, 0x0, &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'team_slave_1\x00', 'gretap0\x00', 'veth0_to_bridge\x00', 'gretap0\x00', @broadcast, [], @remote, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffe}}}}]}]}, 0x1b0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0x1000) [ 973.531739] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x86000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000818008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 974.067355] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:01:27 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000140)={0x15, 0x4, &(0x7f0000000080)="4bc0b82032b94974811476069111aecd70da62f9f4c67a8d794423de4babbe1247894f397107e49357e5500d8c58b68458bad53cd1fabbc4eba1b79fdda275f8eb7276ce250fe4a5064c2e3b0a34ac61f9887981d75da09f5367c88a542fabf157d480691a4dab27fcb1ff49403a9cfbfc5ddb394defd5cd1d15ba833db86ec0982e33acce4a6d285f8843b1a5c612237659441c", {0x80000001, 0xfffffffffffffffd, 0x33735753, 0x6, 0x80, 0x0, 0x9, 0x5}}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000001c0)=0x8, 0x2) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1004, 0x0, 0x11, r1, 0x100000000) [ 974.303523] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:01:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$tipc(r0, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) setns(0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 23:01:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00f00018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000a18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x88a8ffff, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 975.167951] selinux_nlmsg_perm: 1 callbacks suppressed [ 975.168050] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=31327 comm=syz-executor.1 23:01:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 975.483859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=31374 comm=syz-executor.1 23:01:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018020000e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 975.681689] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x9effffff, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 976.072035] kauditd_printk_skb: 216 callbacks suppressed [ 976.072050] audit: type=1400 audit(1550617289.484:35954): avc: denied { map } for pid=31402 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 976.126015] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. 23:01:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 976.178829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=31448 comm=syz-executor.4 23:01:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000b18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 976.236381] audit: type=1400 audit(1550617289.514:35955): avc: denied { map } for pid=31441 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 976.274764] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=31449 comm=syz-executor.1 [ 976.317748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=31452 comm=syz-executor.4 23:01:29 executing program 0: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) close(r0) [ 976.350061] audit: type=1400 audit(1550617289.554:35956): avc: denied { map } for pid=31441 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 976.462047] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 976.478775] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=31457 comm=syz-executor.1 [ 976.499394] audit: type=1400 audit(1550617289.684:35957): avc: denied { map } for pid=31450 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 976.565988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=31458 comm=syz-executor.3 23:01:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000c18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 976.665563] audit: type=1400 audit(1550617289.684:35958): avc: denied { map } for pid=31450 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018028100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xc3ffffff, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 976.748796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=31466 comm=syz-executor.4 23:01:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 976.830049] audit: type=1400 audit(1550617289.844:35959): avc: denied { map } for pid=31453 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 976.962067] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=31471 comm=syz-executor.4 [ 976.977427] audit: type=1400 audit(1550617289.884:35960): avc: denied { map } for pid=31453 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.192187] audit: type=1400 audit(1550617289.884:35961): avc: denied { map } for pid=31453 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000002e6008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:30 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f00000000c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) connect(r0, &(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000080)) [ 977.347079] audit: type=1400 audit(1550617289.934:35962): avc: denied { map } for pid=31453 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000e18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 977.488311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=31485 comm=syz-executor.1 [ 977.508423] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 977.613237] audit: type=1400 audit(1550617289.934:35963): avc: denied { map } for pid=31453 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) modify_ldt$read(0x0, &(0x7f0000000140)=""/145, 0x91) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$audio(0xffffffffffffff9c, 0xfffffffffffffffd, 0x880, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000005c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000480)={&(0x7f0000000500)={0xb0, r3, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8fdb}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x836a}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x24000011) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r4, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x10}, {&(0x7f0000000200)=""/98, 0xffffff03}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4, &(0x7f0000000440)=""/45, 0x2d}}], 0x1, 0x0, &(0x7f00000050c0)) 23:01:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xf0ffffff, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018048100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 978.087039] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:01:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00020018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1f, 0xc0) ioctl$ASHMEM_SET_NAME(r1, 0x81007702, 0x0) [ 978.663252] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018058100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfeffffff, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00001018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c}, 0x7}}, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x928, 0x0) 23:01:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018068100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00030018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 979.631982] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00006018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4200, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000bbfe8)="ad56534c90c2000000000000530038000000000000000000", 0x18) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f000030a000)={0x0, 0x0, &(0x7f000013f822), 0x0, &(0x7f0000fadfd0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f0000b2f000)={&(0x7f00008e8000)=@nfc, 0x80, &(0x7f0000030fa0)=[{&(0x7f000009f000)=""/87, 0x57}], 0x1, &(0x7f0000590000)}, 0x0) 23:01:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2008000000002, 0x6) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) 23:01:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xffffa888, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00040018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018088100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 980.426829] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfffff000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 981.094295] kauditd_printk_skb: 207 callbacks suppressed [ 981.094310] audit: type=1400 audit(1550617294.484:36171): avc: denied { map } for pid=31669 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:34 executing program 0: memfd_create(&(0x7f00000000c0)='$\x00', 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x1, 0xfa00, {0x0, 0x0}}, 0x20) shutdown(r1, 0x2) fsetxattr$security_selinux(r0, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r\"dhcpd_:nitrc_exec_t:s0\x00', 0x29, 0x0) [ 981.300040] audit: type=1400 audit(1550617294.544:36172): avc: denied { map } for pid=31678 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 981.315984] selinux_nlmsg_perm: 10 callbacks suppressed [ 981.315999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=31722 comm=syz-executor.2 23:01:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00050018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 981.449365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2072 sclass=netlink_route_socket pig=31733 comm=syz-executor.1 [ 981.468006] audit: type=1400 audit(1550617294.544:36173): avc: denied { map } for pid=31678 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:35 executing program 3: socketpair$unix(0x1, 0xfffffffffffffffc, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000000c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x20, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000080)=0x5) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000200)) io_setup(0xb7dd, &(0x7f0000000240)=0x0) io_submit(r4, 0xa, &(0x7f0000000d00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x406, r3, &(0x7f00000004c0)="aa27a0af110869fb9f9c59a42c2e1bf525034884617f0d44c618a471283b68a18f13276a2a2c3b5b5fa0d950c07ec88a41920272e134975d4eac0e6ae6bdba06158403483e95524a8d0cc81909aeffc1adce0feec15f8e72d998545c5158bb70a44066f61c40307f746d6986240077e7baf814d3b609bfe98a333bbb1aab630251c992f2c77229d045de", 0x8a, 0x7, 0x0, 0x3, r2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x3c, r2, &(0x7f0000000580)="5997769f4baa7af4649328ffdfc3c3d19181bba4051e1b1ddc908bed6632557d66a9c23d3024db9f123c34871860f75852f650a20c796647467708bb9d84e016f46732cc7a44c8107a52e6fe7aa32710bd46c9a60aad2b20f266ef7635bdb4007f560def4fcfed0935bf27a84a6080e23a3f74c138d26ca55bd3a3f816e5fd588d575b4286c816a2fb647bfffbc087529d98f2f0da2ba1fbb31a3c08e506a7b94d5766e92b7357", 0xa7, 0x200000000000000, 0x0, 0x3}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1, 0xf4, r2, &(0x7f0000000680)="45113d5b27ed7f535c7cf281a2ecab57c226b960833813f4c658befaee08410e84ee7b5a6cdc0f4cfd2c41089a5cbcb9492284cc1683e1b4ec130ecc10ba08b5b8091f9c6a88b49b50ac9820c29dccb365e942fb47263b66e724957ef87ce155bf0872a6788f87997cd1", 0x6a, 0x7, 0x0, 0x3, r2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x5, r1, &(0x7f0000000740)="222fe386e37669c465580cc35308435bf85c2a1157357d20e9872943284d1816b4c94b16830a49ca86e9ed5afb84134e7aa1249e67c0eb504312eaf39c232ba6eb055f36679cec860c3084d6dc7a46248f6392c0", 0x54, 0xfff}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x5, 0x49f, r1, &(0x7f0000000800)="a9d22a9f43f0a2164d9b2feb97273577a5", 0x11, 0x1ff, 0x0, 0x1}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f0000000880)="fa04d1909f1d3d3e2878c9a1fc8f4152cf1b4d0785096b9dbc1a0c1b026829cf95519d7fd625d1f486f452092a0d40397d22218f449de16f6f9365804e2a828757e6a1a55ca6aa288d", 0x49, 0x6, 0x0, 0x1}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0xd, 0x7, r0, &(0x7f0000000940)="8581c487c204dc7afd6963412b9d7bb961f051d73d1d5a15b46fe04d70567c08221ebc2ebc9313d9833f04a405d3b33b7e490946b2bf464879ee6288ff96300b2caf71f97794b863f7c9aa5a316aa5dec92bcc1c549d996867cbd540ff29c278c0c8b674500717a1908bba89ea6ca0e01d6c3e6f2f2467ecb83e403148b2f6c85b09520dda8265634f2007d4466acb2e8e8a56fb76e0da6c916452", 0x9b, 0x13, 0x0, 0x0, r3}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000a40)="280298c84900c7bebb83ab45d9cfdaa8ed8da75258a0076fd77e464c46d4c3099291aa7f8e607cb7321d35cbeb86e6233ad6da497da0012995ba9eeee6ee7305643130d115b01200e3050a6165aef91eb1299b06049b56e71e6635b09bd0d1ec34051f1b4b4b3ae641158ca284d53e1db380224637b252c32e5e85a45251110c566594c3ad777a2bca06", 0x8a, 0x0, 0x0, 0x0, r2}, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f0000000b40)="f8", 0x1, 0xfff, 0x0, 0x2}, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0xf, 0x2, r2, &(0x7f0000000bc0)="b855f2396d3173a12b9b2dcdc64442fc2ef1759a6eb5a7620afb716996721994ea8c6313cd6179c1e9284259b5c0ef5c2d381859052e6d18d8e1f51807bd22f4d3b45173389fdd4f148b9669127090e523ef357be627431c783e7a8d18acc87a66cecb70df5f455576b59fef5e56a7a9de1b2ada5b9b5d84d0de1b0e3f1e67d3e317b888eb0247b7004c1e1d361b6c80c2256d81b0614880beeda483717bb912ec2903a4fbde2c6e82423cdb8fd7c7b08420080423699f3ad809e7dd0ff96d56ebb51e6aad012ea38cc87a417e70ea2e3f50769baaba0f105980b591ff86142a5942de689afc", 0xe6, 0x4, 0x0, 0x1, r2}]) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000dc0)=0x400) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) ioctl$TUNSETGROUP(r2, 0x400454ce, r5) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000040)=0x9) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000280), 0xfffffffffffffdf0) [ 981.567171] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2072 sclass=netlink_route_socket pig=31784 comm=syz-executor.1 [ 981.610304] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 981.611512] audit: type=1400 audit(1550617294.584:36174): avc: denied { map } for pid=31669 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 981.642254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=31786 comm=syz-executor.2 23:01:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0xfffffffffffffffe) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x1000) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000390000)={0x2, 0x0, @local}, 0x10) r3 = open(0x0, 0x141046, 0xfffffffffffffffd) ftruncate(0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000800)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000580)}, 0x78) dup3(r2, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x812}, 0x8) 23:01:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180a8100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xffffff7f, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000020008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 981.793554] audit: type=1400 audit(1550617294.594:36175): avc: denied { map } for pid=31678 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 981.959088] audit: type=1400 audit(1550617294.604:36176): avc: denied { map } for pid=31696 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00060018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 982.073262] audit: type=1400 audit(1550617294.604:36177): avc: denied { map } for pid=31696 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.228424] audit: type=1400 audit(1550617294.624:36178): avc: denied { map } for pid=31693 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.265981] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2584 sclass=netlink_route_socket pig=31804 comm=syz-executor.1 [ 982.421782] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 982.439642] audit: type=1400 audit(1550617294.634:36179): avc: denied { map } for pid=31696 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.528129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2584 sclass=netlink_route_socket pig=31858 comm=syz-executor.1 [ 982.595923] audit: type=1400 audit(1550617294.634:36180): avc: denied { map } for pid=31669 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xffffff9e, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180c8100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:36 executing program 3: r0 = open$dir(&(0x7f0000000140)='\x00', 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}], 0x1, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)=[{&(0x7f0000003880)=""/155, 0x9b}], 0x1}, 0x6}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000003ac0)=""/4, 0x4}, {&(0x7f0000004b00)=""/4096, 0x1000}], 0x3, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {0x0}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x6, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="5802a903000dd68ecf8e", 0xa) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000003c0)={r4, r5, r6}, 0xc) r7 = accept$alg(r2, 0x0, 0x0) recvmmsg(r7, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 23:01:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00070018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:36 executing program 0: socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1f) [ 983.212123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=31926 comm=syz-executor.2 [ 983.294673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=31929 comm=syz-executor.2 [ 983.409939] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 983.486628] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3096 sclass=netlink_route_socket pig=31931 comm=syz-executor.1 [ 983.707882] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3096 sclass=netlink_route_socket pig=31935 comm=syz-executor.1 23:01:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xffffffc3, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180e8100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:37 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d2, &(0x7f0000000400)) 23:01:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000010008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00080018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 984.621555] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x2000) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x80, 0x5e) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$ax25_int(r1, 0x101, 0x4, &(0x7f0000000100), &(0x7f0000000280)=0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x733f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4880) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x204e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='illinois\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x4) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000440)=0x183) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000140)=0x14) sendto(r0, &(0x7f0000000540)="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", 0x525, 0x0, 0x0, 0x0) 23:01:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfffffff0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 984.992174] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:01:38 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x44, 0x0, &(0x7f0000000400)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040), 0xffffffffffffff54, 0xfdfdffff, 0x0}) [ 985.154801] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:01:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018108100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000a0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:39 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x121040) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x8, 0x7, 0xb9}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0xfffffffffffffffc, 0x0, 0x200, 0x3ff, r1}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000240), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0), 0x106, 0x1009}}, 0x20) sendfile(r3, r3, 0x0, 0x7) [ 985.638777] binder: 32075:32079 transaction failed 29189/-22, size 0-0 line 2896 [ 985.720873] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 985.726568] binder: 32075:32084 ioctl 8080aea1 20000040 returned -22 [ 985.843778] binder: 32075:32084 ioctl c0306201 200003c0 returned -11 [ 985.878271] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:01:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfffffffe, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x20000) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000080)={0x0, 0x0, 0x2}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 23:01:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018608100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 986.009625] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 986.014901] binder: undelivered TRANSACTION_ERROR: 29189 [ 986.147728] kauditd_printk_skb: 252 callbacks suppressed [ 986.147744] audit: type=1400 audit(1550617299.554:36400): avc: denied { map } for pid=32088 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 986.363214] audit: type=1400 audit(1550617299.684:36401): avc: denied { map } for pid=32092 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000b0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:39 executing program 3: unshare(0x2000000) r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/cgroup\x00') setns(r1, 0x0) [ 986.565433] audit: type=1400 audit(1550617299.684:36402): avc: denied { map } for pid=32092 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 986.599585] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 986.712846] selinux_nlmsg_perm: 6 callbacks suppressed [ 986.712933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24600 sclass=netlink_route_socket pig=32104 comm=syz-executor.1 [ 986.733110] audit: type=1400 audit(1550617299.724:36403): avc: denied { map } for pid=32092 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 986.760583] input:  as /devices/virtual/input/input15 23:01:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xf0ffffffffffff, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 986.898715] audit: type=1400 audit(1550617299.724:36404): avc: denied { map } for pid=32092 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 986.981565] input:  as /devices/virtual/input/input16 [ 987.020685] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24600 sclass=netlink_route_socket pig=32108 comm=syz-executor.1 [ 987.137247] audit: type=1400 audit(1550617299.804:36405): avc: denied { map } for pid=32092 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:40 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") bind$inet(r2, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x7f, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendmsg(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000540)="b6", 0x1}], 0x1}, 0x4048000) sendto$packet(r1, &(0x7f0000000140)="9f", 0x1, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 23:01:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008102000f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 987.344613] audit: type=1400 audit(1550617299.864:36406): avc: denied { map } for pid=32092 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.461800] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 987.569700] audit: type=1400 audit(1550617299.864:36407): avc: denied { map } for pid=32092 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.663960] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 987.724084] audit: audit_backlog=65 > audit_backlog_limit=64 [ 987.753010] audit: type=1400 audit(1550617299.964:36408): avc: denied { map } for pid=32092 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.883651] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000c0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x100000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:41 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)='\x00') pselect6(0x40, &(0x7f0000000000)={0x1, 0x3, 0x20, 0x9, 0x6, 0x8, 0x3, 0x3ff}, &(0x7f0000000080)={0x2, 0x556c4964, 0x81, 0x4, 0x6, 0x73, 0x71767139, 0x9}, &(0x7f00000000c0)={0x6, 0x2, 0x1ff, 0x1, 0x740, 0x7f, 0xffffffff}, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000180)={&(0x7f0000000140)={0x3}, 0x8}) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x20) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000240)=ANY=[@ANYBLOB="f197f1b2cd59f6283a177c1d93fa4f7248e829d99f8e87942dc876458588ad9ea000c17405effa14643fcf9e"]) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x5, 0x4, 0x7, {0x4, @win={{0xb9df, 0xcc7e, 0x1f, 0xff}, 0x6, 0x3, &(0x7f00000005c0)={{0x1, 0xffffffffffff0001, 0x8, 0x5}, &(0x7f0000000580)={{0x200, 0x1, 0x6, 0xffffffff}, &(0x7f0000000540)={{0x4, 0x1, 0x4, 0x8c1}}}}, 0xffffffff, &(0x7f0000000600)="a7284d02966e15ac5c82251d15bca9e1fdbdc6af72cc0100c509b1e45be0ecf385ab99b209eb9265817733986ee80a3a76fa85002436f6ae5aec18bf1c0874c1704cf385dd65f70ccb7247e116b87e98e4c20e04e5d540c6da11690a7c7df0df409f5b9c7eb6021fc85f8a026ae8851a3771cc353f77c29987669e175e43b5", 0x40}}}) [ 988.698116] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 23:01:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000440)={0x0, 0x0, 0x5531, 0x0, 0x400}) [ 988.852787] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:01:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180081001b0f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 988.988009] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 23:01:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 989.143874] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:42 executing program 0: connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x7fe, 0x7fd) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000340)="c401f5f81e0f3566b859000f00d866ba6100ec400f00970d000000440f01d13666410f3882118f697093e948b87d7a0000000000000f23c00f21f835020008000f23f86626470f06", 0x48}], 0x1, 0x29, &(0x7f0000000280)=[@efer={0x2, 0x6000}], 0x1) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r3, 0xae03, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000000)=0xe) ioctl$KVM_RUN(r5, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r6 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x404000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r6, 0xc0086421, &(0x7f00000001c0)={r7, 0x2}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r6, 0x40405514, &(0x7f0000000200)={0x4, 0x6, 0x0, 0x7, 'syz0\x00', 0x100}) 23:01:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x200000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='B\x03cg\xb9\x85}\x1e\xb7\x15l)\xf8\xbam\xd5M,8N\xcc\x8f\xbf.\n\xa8\xbc5\xec\v\x03\xf7\xc5(`N[\x95\x95F\xd0\xd8T\x8f\xaeyp\x9fU\xbb\xeaa\xd6\xd7l\xb04\xa55\x97\x12\x02\x81P\x84\xe6\x83\x9b\x98\xbb\x916cP\xc4\x17iT\x8f*\x11*\x1c\x19\xda\xd4.\x10g\x0f\xe4v\xa9\xa3\xe5\xcc\xd1P\xc9\xc0y\x97\xf7\x10\xb7\xba\xac&\xd8\x92aL\x90\xda:>|\xd0\x80O\xea\x8c\x9f<\xb1\xc8OW\x01Y\xde\x0f\xb3!\x04\f\x05\xbf\x96\x1f\x7f+A\xec\xc4\x12\x9e=\xab\x8dW\xc9\n\xadI\xbcB\xf0\f\xe7l\xa2\x99\x96I\x7f\xf7x\x9b\xa0H\xc7\xa9\xd4\x0fE', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0x10) [ 990.163514] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 990.234525] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 990.327081] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:01:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008102e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x300000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000f0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 990.714492] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:01:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00100018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000e0018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 991.032639] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 991.076198] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 23:01:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008104e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x400000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 991.196808] kauditd_printk_skb: 233 callbacks suppressed [ 991.196823] audit: type=1400 audit(1550617304.604:36634): avc: denied { map } for pid=32306 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 991.393673] audit: type=1400 audit(1550617304.644:36635): avc: denied { map } for pid=32308 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 991.524066] audit: type=1400 audit(1550617304.644:36636): avc: denied { map } for pid=32308 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 991.631302] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 991.677137] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 991.729425] audit: type=1400 audit(1550617304.654:36637): avc: denied { map } for pid=32308 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 991.770567] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 991.912184] audit: type=1400 audit(1550617304.654:36638): avc: denied { map } for pid=32305 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.084071] audit: type=1400 audit(1550617304.654:36639): avc: denied { map } for pid=32305 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.260204] audit: type=1400 audit(1550617304.664:36640): avc: denied { map } for pid=32306 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.333540] audit: type=1400 audit(1550617304.664:36641): avc: denied { map } for pid=32306 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.367897] audit: type=1400 audit(1550617304.674:36642): avc: denied { map } for pid=32305 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.435553] audit: type=1400 audit(1550617304.684:36643): avc: denied { map } for pid=32306 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:46 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f00000001c0)={0x7, "3f6939fb454659e09582eeb41ac6702678e4165f0b618a2cb3402f0c57d43b54"}) 23:01:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00600018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x500000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008105e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 993.609237] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 993.673901] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=32342 comm=syz-executor.2 23:01:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00f00018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 993.747927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=32348 comm=syz-executor.2 23:01:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1e5) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x5, 0x10001, 0x100000000}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x2, 0x20}, 0x7) ioctl$RTC_UIE_OFF(r1, 0x7004) write$binfmt_aout(r0, 0x0, 0x0) renameat(r1, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') 23:01:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x600000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018020000e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 993.999932] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 23:01:47 executing program 3: socketpair(0x1e, 0x80805, 0x0, &(0x7f00000001c0)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) recvmsg(r1, &(0x7f00000028c0)={&(0x7f0000002740)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002800)=[{&(0x7f00000027c0)=""/28, 0x1}], 0x1, &(0x7f0000002840)=""/77, 0x4d}, 0x0) recvmsg$kcm(r1, &(0x7f00000013c0)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000100)=""/64, 0x40}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000001200)=""/62, 0x3e}, {&(0x7f0000001240)=""/214, 0xd6}], 0x5}, 0x2) sendmsg$kcm(r0, &(0x7f0000001880)={&(0x7f0000001400)=@ethernet={0x1, @random="749ddcca71af"}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001480)="01f49a690733b7a6398ccb89d124c5e20054209f5f2417e5d27618113ca21d35f4e1735621bf01a270c992a0ae7559377a25305859e87ea80a010f4e184a3786b386142ff8d7d782984d9deb8cc38f0b1fb26aa553cb2c2f5ada6a245cafd4665fbd5fbe2c705d06b201603356cf08770bcea5eceab4be092721fb5dccc08f9ae2ffb9b04fcb3b81e5e6b796209065adbfddb9e93f75078568eaf1ce8bcd98268572d804aa172f8bd624605efd029cf56a8cf913e2dc9ca2a1b8b7f8b24a29dd80c224add9acc16a09b4c55d0d933a4504058fd75d7399493c13cc6b5152bbd613963684dca482743ac235810b01c8192764ec5c7c4b6b", 0xf7}, {&(0x7f0000001580)="5e2453d901addcf124ce74627013e368ee237f75835520f99ea452f35cb1a98662728b1e8337c12d1e9c032e052d51fb6fd37f12ef4a6e43ad03154fcaa95ea5b59ea3a63a8298c881c5eea0b957fd99af89bfb79ff271145deb9ca90c7db730609f6cdc47758ebb4a2637892f7cf37144bfb386c1fe82799834ec3cd76cea28ab031823a05840cc483ce4fa6c78b54dfa8dbf19516ad4217c89319fb6c8", 0x9e}, {&(0x7f0000001640)="80e67891bf8ccf90daee4c7bc631f641bbd939175469767fbf704db0c5d5551cd9f99e4b639e3e9c3e63309c8f505adf1fcc89cc5a6d8c34caf477ab1a949fd444884f7fff58a3437b5801cc2a9ca6b69295ff400ab0bdb2b8fd9e46fb42d8118f6f1e333a151497f7f6424b8c755ec4201b017f50f2efbc420ea2e5a712a8f58b962e4bf3e79e12f825ce1b76a0f2ce79edcc59a37c3d", 0x97}, {&(0x7f0000001700)="1e6cf395", 0x4}, {&(0x7f0000001740)="1f2bf1219ceb53dcf9a9dd5e52056ad59be66375397bdc613a8c7c83c8ac4ff71379afa0e70b7e641e534f450983ba31c431bf48caae5baa4a4f6f01f30c828061d1bcb5e0f5cfb9f3eedf47367dc95979725a1a7e7124a12562a3777ac59c12d7f6a004f0e950756108214e15bd0d24437583b171f675e3a51a7bd5a19b1a9e6bad9f7612c834ab30ce5462c7358872a901165632442b86f32239c4b04cb8abe05b23ae5a263d849530f891004c35f4d5edfc3f", 0xb4}], 0x5, &(0x7f0000003c40)=ANY=[@ANYBLOB="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"], 0x1298}, 0x51) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f00000018c0)=""/47, &(0x7f0000001900)=0x2f) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x7fff, @default, @rose={'rose', 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001940)={r2, @empty, @multicast2}, 0xc) 23:01:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)=@ipv4_newrule={0x44, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, [@FRA_GENERIC_POLICY=@FRA_PROTOCOL={0x8}, @FRA_FLOW={0x8}, @FRA_FLOW={0x8}, @FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0x0, r1}}]}, 0x44}}, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7ff, 0x8000) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000040)={0xa, 0x2, 0x5, 0xe8}, 0xa) [ 994.263985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=32367 comm=syz-executor.2 23:01:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00d80118008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 994.312771] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 994.519441] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=32370 comm=syz-executor.2 23:01:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008106e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x700000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018028100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x3}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) fsetxattr(r1, &(0x7f0000001140)=@known='com.apple.system.Security\x00', &(0x7f0000001180)='nr0\x00', 0x4, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000100)={0x8, 0x56, 0x2, @link_local, 'nr0\x00'}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x100, @rand_addr="5cd6fbddcfb957ed82265ee230b287eb", 0x7}], 0x3) r3 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x7, 0x2000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r4, 0x8}, &(0x7f0000000200)=0x8) 23:01:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 995.482643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=32427 comm=syz-executor.2 [ 995.606459] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=32447 comm=syz-executor.2 23:01:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018038100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:49 executing program 3: [ 996.234824] kauditd_printk_skb: 176 callbacks suppressed [ 996.234839] audit: type=1400 audit(1550617309.644:36820): avc: denied { map } for pid=32496 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 996.339661] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 996.422729] audit: type=1400 audit(1550617309.654:36821): avc: denied { map } for pid=32496 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x800000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 996.581716] audit: type=1400 audit(1550617309.694:36822): avc: denied { map } for pid=32496 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00460318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008108e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:50 executing program 3: [ 996.727981] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=792 sclass=netlink_route_socket pig=32514 comm=syz-executor.2 [ 996.788245] audit: type=1400 audit(1550617309.754:36823): avc: denied { map } for pid=32496 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 996.872439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=792 sclass=netlink_route_socket pig=32514 comm=syz-executor.2 23:01:50 executing program 0: [ 996.911451] audit: type=1400 audit(1550617309.774:36824): avc: denied { map } for pid=32496 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018048100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 997.067974] audit: type=1400 audit(1550617309.824:36825): avc: denied { map } for pid=32496 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.072716] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:50 executing program 3: 23:01:50 executing program 0: 23:01:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00470318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x900000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 997.303425] audit: type=1400 audit(1550617309.824:36826): avc: denied { map } for pid=32496 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.413097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1048 sclass=netlink_route_socket pig=32531 comm=syz-executor.2 [ 997.522167] audit: type=1400 audit(1550617309.904:36827): avc: denied { map } for pid=32501 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018058100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 997.663130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 997.681345] audit: audit_backlog=65 > audit_backlog_limit=64 23:01:51 executing program 0: 23:01:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ae00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:51 executing program 3: 23:01:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 998.290288] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 998.408131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1304 sclass=netlink_route_socket pig=32547 comm=syz-executor.2 23:01:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xa00000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018068100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:52 executing program 0: 23:01:52 executing program 3: [ 998.835900] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00c70518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xc00000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:52 executing program 0: 23:01:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ce00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:52 executing program 3: [ 999.297915] selinux_nlmsg_perm: 1 callbacks suppressed [ 999.297958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1560 sclass=netlink_route_socket pig=32571 comm=syz-executor.2 [ 999.511681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1560 sclass=netlink_route_socket pig=32572 comm=syz-executor.2 23:01:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018088100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 999.778577] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:53 executing program 0: 23:01:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xe00000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:53 executing program 3: 23:01:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ee00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1000.682955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2072 sclass=netlink_route_socket pig=32594 comm=syz-executor.2 [ 1000.772297] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1000.868468] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2072 sclass=netlink_route_socket pig=32601 comm=syz-executor.2 23:01:54 executing program 0: 23:01:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180a8100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x1000000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:54 executing program 3: 23:01:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000718008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1001.334283] kauditd_printk_skb: 237 callbacks suppressed [ 1001.334297] audit: type=1400 audit(1550617314.744:37061): avc: denied { map } for pid=32614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:54 executing program 0: futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000100), 0x2) getgroups(0x0, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 23:01:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000140)=@full={0xb, @dev, @remote, 0x8, [@rose, @remote, @remote, @rose, @netrom, @rose]}, 0x40) [ 1001.535060] audit: type=1400 audit(1550617314.754:37062): avc: denied { map } for pid=32613 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1001.578440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2584 sclass=netlink_route_socket pig=32616 comm=syz-executor.2 [ 1001.699755] audit: type=1400 audit(1550617314.754:37063): avc: denied { map } for pid=32613 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1001.715624] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2584 sclass=netlink_route_socket pig=32621 comm=syz-executor.2 [ 1001.826236] audit: type=1400 audit(1550617314.784:37064): avc: denied { map } for pid=32613 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1001.881351] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180b8100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1002.048292] audit: type=1400 audit(1550617314.794:37065): avc: denied { map } for pid=32614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008110e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4000000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1002.226591] audit: type=1400 audit(1550617314.794:37066): avc: denied { map } for pid=32614 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000a18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1002.411976] audit: type=1400 audit(1550617314.814:37067): avc: denied { map } for pid=32613 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:01:55 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0x0, 0x8}}}}}}, 0x0) [ 1002.457110] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1002.527587] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1002.567403] audit: type=1400 audit(1550617314.814:37068): avc: denied { map } for pid=32614 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.690806] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1002.708977] audit: type=1400 audit(1550617314.874:37069): avc: denied { map } for pid=32613 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.717713] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1002.785538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2840 sclass=netlink_route_socket pig=32643 comm=syz-executor.2 [ 1002.840193] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.846750] bridge0: port 1(bridge_slave_0) entered disabled state 23:01:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ee00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1002.984202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2840 sclass=netlink_route_socket pig=32651 comm=syz-executor.2 23:01:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180c8100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000b18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1003.549213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3096 sclass=netlink_route_socket pig=32667 comm=syz-executor.2 [ 1003.641947] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1003.646770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3096 sclass=netlink_route_socket pig=32669 comm=syz-executor.2 23:01:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180e8100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1003.725231] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.731676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1003.738355] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.744781] bridge0: port 1(bridge_slave_0) entered forwarding state 23:01:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000c18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1003.861057] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1003.919889] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1004.222294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1004.228835] bridge0: port 1(bridge_slave_0) entered disabled state 23:01:57 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x26, &(0x7f0000000000)='*%cpusetmd5sum%#.selfposix_acl_access\x00', 0xffffffffffffffff}, 0x30) capset(&(0x7f0000000140)={0x19980330, r0}, &(0x7f00000001c0)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000340)) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000380)={0x2e, 0x7, 0x6, "f6d949bd932da09f2c100c603e12fbb8cc87352c51d7136d3c57fc1f66bcc596353d4c977623d1c4b770293b2c7d"}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000300)={0xc20421de2dd857a, &(0x7f0000000280)=[{}, {}, {}, {}, {}]}) r2 = msgget(0x2, 0x609) msgctl$MSG_INFO(r2, 0xc, &(0x7f00000000c0)=""/82) r3 = socket$inet6(0xa, 0x80800, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x53, &(0x7f0000000180), &(0x7f0000000140)=0x5) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x8000, 0x0) 23:01:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ee00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4603000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008160e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000e18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018108100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1004.637269] selinux_nlmsg_perm: 2 callbacks suppressed [ 1004.637285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4120 sclass=netlink_route_socket pig=32691 comm=syz-executor.2 [ 1004.663698] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1004.802488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4120 sclass=netlink_route_socket pig=32701 comm=syz-executor.2 23:01:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x4703000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018608100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:01:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x1000000000005, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$kcm(r1, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)="01", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)=""/93, 0x5d}], 0x1}, 0x0) [ 1005.733882] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:01:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180081001b0f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1005.923727] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24600 sclass=netlink_route_socket pig=32724 comm=syz-executor.2 23:01:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00003f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1006.062641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24600 sclass=netlink_route_socket pig=32726 comm=syz-executor.2 23:01:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x172, 0x4, 0x1000, 0xba}, {0x1, 0x0, 0x81, 0x3}, {0x8, 0x7, 0x8, 0x8}]}, 0x10) prctl$PR_GET_SECUREBITS(0x1b) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00009da000), 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x2000026b, &(0x7f0000000040)=[{}]}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x202, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0x26}, 0x4e20, 0x6, 0x4e24, 0x0, 0x2, 0x80, 0x0, 0xff, r3, r4}, {0x4ad, 0x8, 0x10000, 0x7, 0x14a4, 0x7de98b3e, 0x5, 0xffffffff}, {0x10000, 0x2, 0x4}, 0x2, 0x0, 0x0, 0x1, 0x3}, {{@in6=@local, 0x4d5, 0x6c}, 0x2, @in6=@remote, 0x3501, 0x1, 0x1, 0x100000000, 0x2, 0x3, 0x20}}, 0xe8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x2355c415751944cb) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000300)=""/218, &(0x7f0000000400)=0xda) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000440)=0x7638bdfc, 0x400) sendto$inet6(r0, &(0x7f0000000540)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) 23:01:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x6000000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:01:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008102000f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1006.341556] kauditd_printk_skb: 291 callbacks suppressed [ 1006.341572] audit: type=1400 audit(1550617319.754:37320): avc: denied { map } for pid=32727 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.543607] audit: type=1400 audit(1550617319.764:37321): avc: denied { map } for pid=32727 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.745694] audit: type=1400 audit(1550617319.834:37322): avc: denied { map } for pid=32727 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1006.981000] audit: type=1400 audit(1550617319.834:37323): avc: denied { map } for pid=32727 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00004018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1007.118498] audit: type=1400 audit(1550617319.844:37324): avc: denied { map } for pid=32725 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) r1 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="759081275493d450b640b5ac4e15bc00", 0x10, 0xfffffffffffffff9) keyctl$get_persistent(0x16, r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000001c0)=0x1) sendto$inet6(r2, 0x0, 0x0, 0x20000007, &(0x7f000031e000)={0xa, 0x0, 0x0, @initdev, 0x1ff}, 0x1ba) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev, 0x2f9c}, 0x1c) [ 1007.176683] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1007.250176] audit: type=1400 audit(1550617319.954:37325): avc: denied { map } for pid=32732 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180081001b0f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e01780ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1007.369210] audit: type=1400 audit(1550617319.994:37326): avc: denied { map } for pid=32732 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x6558000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:00 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0xc514, 0x200000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0x4) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x4) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2000000000000000, 0x7c00) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000001c0)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000140)=r2) ioctl$TCSBRK(r1, 0x5409, 0x3f) [ 1007.560447] audit: type=1400 audit(1550617320.034:37327): avc: denied { map } for pid=32732 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00034618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1007.764271] audit: type=1400 audit(1550617320.054:37328): avc: denied { map } for pid=32734 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1007.777853] audit: audit_backlog=65 > audit_backlog_limit=64 23:02:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x8, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x460200, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x2f) [ 1008.300435] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x8100000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:02 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fstat(0xffffffffffffff9c, &(0x7f00000000c0)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getegid() r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3ff, 0x7ff, 0x0, 0x5, 0x6, 0x8, "1574d1f09e5a4891c6a1df3042d084b10fb0d6ce23fbd257294cd72607fe8277e9f3bdd6c51a98470842e0cd740897f983b9ed5f8484e516c838a1a1d815fea6", "937656ed4dca63b5fccd3cbd3d04f45a53b9fc0c7f1b62632e812f135132e07ba04613790fe264371fa3a9f94ffd03083beb0ba5cb308efe736bb9475f981704", "a9f5d63734865ed0ef9986c7002349b99bad62c895dd8383324625076e7da74e", [0x3f, 0x9]}) getgid() fstat(0xffffffffffffff9c, &(0x7f00000001c0)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2000, 0x0) symlinkat(&(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00') ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) setgroups(0x4000000000000236, &(0x7f0000000280)) 23:02:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f802bdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:02 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008102e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00034718008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1009.096229] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x2800a) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) ptrace$cont(0x1f, r1, 0x22d, 0x585dda64) 23:02:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x8, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x460200, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x2f) 23:02:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x8600000000000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00655818008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008103e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:03 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @random="e3512277f661", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 23:02:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x6e) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/validatetrans\x00', 0x1, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x2000) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x7) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x2) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000140)={{0x5}, {0x37}, 0x36628652, 0x2, 0x400}) [ 1010.281548] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f8093db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x88a8ffff00000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:04 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000180), 0x4) r1 = socket$nl_crypto(0x10, 0x3, 0x15) bind$netlink(r1, &(0x7f0000000300)={0x10, 0x0, 0x25dfdbfe, 0x80000}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x400000, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f00000003c0), &(0x7f0000000380)=0x23f) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000280)) 23:02:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00006018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x12, 0x8c, 0x40000000004, 0x200}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000000)={r0, &(0x7f00000000c0)="6de00d16b5bde5998061864890d9d929505f", 0x0}, 0x18) [ 1011.384062] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008104e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1011.493328] kauditd_printk_skb: 273 callbacks suppressed [ 1011.493342] audit: type=1400 audit(1550617324.904:37588): avc: denied { map } for pid=581 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x9effffff00000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1011.701475] audit: type=1400 audit(1550617324.904:37589): avc: denied { map } for pid=583 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1011.936771] audit: type=1400 audit(1550617324.904:37590): avc: denied { map } for pid=583 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:05 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r1 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000540)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\'', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$P9_RRENAME(r1, &(0x7f0000000240)={0x7, 0x15, 0x2}, 0x7) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) timer_create(0x3, &(0x7f00000000c0)={0x0, 0xc, 0x2, @thr={&(0x7f0000001b80)="263caa2d8a9a0d28b1003c0b025c3f27e05b7c42b1896d4b46e70218ecd27f4b166466eaf517c7336285ced6ec7cc5304d12889d75f3af3d0069e620e7fcdeb0cc5d168642857c1f7ed2be8b6cc35e6fa92d5900b123ef3429475e68defd26639fa9b26058d7dacffc0e450703818e9f8128ae7b997cc7fbefe5528601459dc73b709f8a08593793fc60d66f48563fd1576057c9fa858cfb2c6a3b54fede0c1a0f20c52321fa2ea95423335793674ff44c3bc42cc19737c638c6884849a79808b9d74425f021ca490e9b14db6224d433e00c564f", &(0x7f0000001c80)}}, &(0x7f0000000480)=0x0) timer_gettime(r4, &(0x7f00000004c0)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000680)={0x0, 0xf, 0x4, 0x80004000, {}, {0x1, 0x8, 0xb78, 0xb3f, 0x1, 0x0, "cc16c16c"}, 0x1, 0x0, @fd=r0, 0x4}) eventfd2(0x10001, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={&(0x7f0000000a40)=""/232, 0xe8, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r0, 0x10, &(0x7f0000000740)={&(0x7f0000000940)=""/252, 0xfc, r5}}, 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000b80)=""/4096, &(0x7f0000000040)=0x1000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) 23:02:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00586518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1012.101806] audit: type=1400 audit(1550617324.904:37591): avc: denied { map } for pid=583 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f8094db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1012.286226] audit: type=1400 audit(1550617324.934:37592): avc: denied { map } for pid=583 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.293770] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:05 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000180), 0x4) r1 = socket$nl_crypto(0x10, 0x3, 0x15) bind$netlink(r1, &(0x7f0000000300)={0x10, 0x0, 0x25dfdbfe, 0x80000}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x400000, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f00000003c0), &(0x7f0000000380)=0x23f) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000280)) [ 1012.428725] audit: type=1400 audit(1550617324.934:37593): avc: denied { map } for pid=581 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008105e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1012.599761] audit: type=1400 audit(1550617324.944:37594): avc: denied { map } for pid=581 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00008118008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xc3ffffff00000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1012.766836] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1012.830765] audit: audit_lost=548 audit_rate_limit=0 audit_backlog_limit=64 [ 1012.837913] audit: backlog limit exceeded 23:02:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80a7db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:06 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r1 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000540)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\'', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$P9_RRENAME(r1, &(0x7f0000000240)={0x7, 0x15, 0x2}, 0x7) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) timer_create(0x3, &(0x7f00000000c0)={0x0, 0xc, 0x2, @thr={&(0x7f0000001b80)="263caa2d8a9a0d28b1003c0b025c3f27e05b7c42b1896d4b46e70218ecd27f4b166466eaf517c7336285ced6ec7cc5304d12889d75f3af3d0069e620e7fcdeb0cc5d168642857c1f7ed2be8b6cc35e6fa92d5900b123ef3429475e68defd26639fa9b26058d7dacffc0e450703818e9f8128ae7b997cc7fbefe5528601459dc73b709f8a08593793fc60d66f48563fd1576057c9fa858cfb2c6a3b54fede0c1a0f20c52321fa2ea95423335793674ff44c3bc42cc19737c638c6884849a79808b9d74425f021ca490e9b14db6224d433e00c564f", &(0x7f0000001c80)}}, &(0x7f0000000480)=0x0) timer_gettime(r4, &(0x7f00000004c0)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000680)={0x0, 0xf, 0x4, 0x80004000, {}, {0x1, 0x8, 0xb78, 0xb3f, 0x1, 0x0, "cc16c16c"}, 0x1, 0x0, @fd=r0, 0x4}) eventfd2(0x10001, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={&(0x7f0000000a40)=""/232, 0xe8, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r0, 0x10, &(0x7f0000000740)={&(0x7f0000000940)=""/252, 0xfc, r5}}, 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000b80)=""/4096, &(0x7f0000000040)=0x1000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) 23:02:07 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000180), 0x4) r1 = socket$nl_crypto(0x10, 0x3, 0x15) bind$netlink(r1, &(0x7f0000000300)={0x10, 0x0, 0x25dfdbfe, 0x80000}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x400000, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f00000003c0), &(0x7f0000000380)=0x23f) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000280)) [ 1014.035955] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0005c718008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xf0ffffff00000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008106e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3ab85f04000000d2eb", 0x10) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r2 = getuid() syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000340)='./file0\x00', 0xffffffffffffff01, 0x7, &(0x7f0000001880)=[{&(0x7f0000000380)="04323d529b8fec4b8d088ff6bf9593646f78cd11371d684c53797f2d3714fa2244d09924119542fe855292cbb5d8edb412c94b024a037202102fd56be47a9a4a9380d3ebc0a87e0ddad0d791bba9bb9acfde47927d1fb8aebecd774b169ad451b31ea27e22b88bd539cc3968aa98b820a86038b06fda34fe4198da91bee865ec962dd73335c0832bf88056632093fbd18891e6a3cd8a8d2fe77de6c222ef2917adfefb948465b48594e81e54c7e4702bea96df989135e7", 0xb7, 0xffffffff7fffffff}, {&(0x7f0000000440)="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", 0xfb, 0x8cc}, {&(0x7f0000000540)="9281a0d15f7417be32f7388ff91d6df11e0c688561d37e43555a159c2452229d90a57599ffd146f57c080c83467e505881a35f244adfab46647b5d67b8838bf900b4af9d22f4f6159190bfca32e3c819c11adc458ecb69c16b1c3d3c7accf18ee0ee6113a22b75d78018bf9453da8f18770bf6aa687812a34d8656ba7b93de88bb6ef89d7f5a58f827", 0x89, 0x6}, {&(0x7f0000000600)="d3914f8cc3b7e8149c684b7f2c6df1f4ffa3bfb415fe7c10635ac4452f33052ea7ff0c5f24c2353284287dc252d4ac5e966da44fbc722fa6b06a5f73ca40905a7b84afd7722cd2ce9a4105f4d01148c7bf67c8d875e3685680eb09673a14aef489633da1142a68fa83d1a5d69202559edea9a2c5a7e94038f94bf877c55352f488d3197a621d5d7daac82410c32fdef01d168cbfe882667915ddebfc3ff1dcb0cc78235b5c21c1700c29070817cbe305dd168b7d7811c31c724e123cff49b9732425e376ba7c683f728c16336b837043cb095cdad7c4b0196667", 0xda, 0x5}, {&(0x7f0000000700)="6b5ebd556dddcb26a7e2ecb75bd86264e6a3f056ba462219c368765f2498af15f08234f3a7e0d649f59467b184763bb48874b01b76296125445eb0ce8166ea70dee3704d3d473c3c1ed57c7ee1d91ecdebed2e0778176882b79c5801761f898da9755a1ce2377d24e5a47d51a1db4a0c33412dc29a1036e8dc1bd756d8c55e7fe48607bff2e253a3f8090550006e5a876959c8c24c8c4ca7acff68edaf9a3df09c9a5f1b60e598ce2113ee04adccc5748adb61d3976c0b01ccad76b00ce16be8", 0xc0, 0x3}, {&(0x7f00000007c0)="a33585828b7bcd8121f741372a8253def8413ee7a52ad553dc6955ca25f8eb66b4b162f5b3c0d34bf4c5f642ebd23a9a37ab1c0f50d8758f4f348fbead560805737b03034fc366630b36045d8f9c6359d4332a296b07b45a06c30aeecf0200ab9e762a21faeb1d9864c48ea429eabd726608bfc74b7a9e385690cd027c8438957d63", 0x82, 0x4}, {&(0x7f0000000880)="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", 0x1000, 0xd5b}], 0x4000, &(0x7f0000001940)={[{@filestreams='filestreams'}], [{@euid_lt={'euid<', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x7259}}, {@obj_type={'obj_type', 0x3d, 'skcipher\x00'}}]}) r3 = accept(r1, 0x0, 0x0) r4 = msgget(0x0, 0x8) msgrcv(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000fdff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xd9, 0x2, 0x3800) sendto$packet(r3, &(0x7f00000001c0)="4d384b8bc46e2b1a13071cc8b9e995f3a770dfe7e9d1015be1df343a3f2cf6b6c6803c5ae5a5c1bd8f2b8b365832c673b71a5cc71d02700d675a686c3dab35a5c61873679f5c", 0x46, 0x8000, 0x0, 0x0) sendmmsg$nfc_llcp(r3, &(0x7f0000008140)=[{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b00)="59942a2480cd20f7b0367faffef20ff5f0bf8ee11a4449beea1523ff2b599d5be4c0c44df9c05bd54ba217fa8780f772894fe4e5acf83eb3507aca9a516c82797274477b296f089abb630111ed990df118fd1c5e7f2384e7d70d50940208615307d8785f8941a70610b841b5fff68e5f62839483037a96572ffeb4e482a67ec82d7d3e4834c9359f7f605e09aa94aaa4", 0x90}], 0x1}], 0x1, 0x8001) sendmmsg$unix(r3, &(0x7f0000003f00)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}], 0x2, 0x0) 23:02:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000a00)=[{{&(0x7f0000000000)=@generic={0x5, "c80afd161e5b9ce6c84d35dba838ee5bf67393d9fb45d9031a75ef66fee53f7903f0b990c45fc07992ee0642bc11949a7f024b8d0cd1eb66611f80ffbe709e4dd88ec586d964884a4db1a4a4b204cb70c93c6df1a54db6f21c894fd131466d8200e676da9254fce122c845108c6a8dde72cba6e00f4b8aa986bacbe45dbf"}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)="c4ac286d0b851b5bf698324646bc3c1bec870975e87b5a3f919b9ad4aed122025f5e8f806e87f5f3390dbe88362caf7944842899c4e84b6ac32e565471858743fdc2eb5274b62d8b9b56f08e69d508d91319bb1e634602984677afb11ad12cc67e99f478cd986ca141ca1d156496c25ccfe5", 0x72}, {&(0x7f0000000100)="d09b5348cdbaa3fcc83a55f5dbf162b92810dc92657316b6e07fdc6fac04ab446069ff09cea5bb55ca296131", 0x2c}, {&(0x7f00000002c0)="c018a28334fb316d8497b072ec53cc3ddd7f600b5ad637ce3fe624e0ffbae63c272dd92a7a41cf79d2ea00dfc1cf4a54f8d3204fa2d990e2cd119708d78fa38c5a14f85d0f00dc162bc5bac86bd46b302f95aa7c7466c3e499246dbc108781fce38a9210f40607a326cbb27a7324a489b82af6fc71f530ba8ad2d8951a8f3a0e2aab5bdd993e61dce0028f58eaaf2a3d77c3f9271635248f74adcaed3f1e1efe7ec1a9ac574c3e6057bd4235e8f3e3", 0xaf}], 0x3, &(0x7f00000012c0)=[{0x90, 0x1ff, 0x9, "7d8c4354194d035c48317c58745757721dc82d5b23727c37e60ee10d09c72ba548a843dacc9c1c23dec81144cd2df61dc615a37c535212ebe3e67050ef9e3e1148a5a1bbd409efb8e8e8a9dd090e4acd0e17b68d64f6548990fb5a07c5d80bf8d5d80d7e742a50703672b7597c9f1c4e07dd8618f08f3d0fe042dde716fd1c"}, {0x80, 0x11b, 0x3f, "a6a6cf035e5cf53f561a1c7f4a8cca94e5c21d9bec3886fa5d639c6ffac9e173e75e030a91cf65a5547cb5903953d8adefd669cf9baf76c0a183c63fca3b67452d2bb3fa2d0fdface3dcc67969ea3eac0c5f3f0809b380c203024054aafd8ba9c884398c8d0a162d78"}, {0x1010, 0x10b, 0x1, "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"}, {0x20, 0x117, 0xa8, "10ba4910f651f43efad24c896e"}, {0x78, 0x111, 0x0, "cb4ace77406b95e37665f712afb5ec564f2020b9ecbb49fb0533ba2c1c585f73df23171c21d5e8ed4c0077de575fc7373baa7446a405a3a2e39d20b223ea1d837ae572151190960337247c8c38ee60bfe5fad4fff85873be664c8f65deec28105d7984774f62a9"}, {0xf0, 0x117, 0x8, "dab9646b3ff9abbfed51d7f2429acd38462d28bd744c41a541fe5b410a49fd4e622b7300896a536ec6ed086e8099f07bfc1f942727ad2f71cfb22234b90804076c20d695fa1a118eaf79e8b4bc86b5140f72e07fabea8f3fa607b1226d0ced32729f39fc60f56d1222bcc737d89cd4b57cc85d7908c2a726d820acca24a9e770bf0f9e028a1990cfc08ca71039ba5b399a9abf264a3b5b743df5074a18cce3ef0b52718666a51e577fba4c89aaf9a4f29671ff247c3e27a0d4015126a59196395aa2466e0cabe5f6301217a9b16bdc6e750fd4c777f9f7149ceb655814"}, {0x108, 0x0, 0xc77e, "b7cd73c9b4f1779c4a985aaebdfbdca2f27460a8554ab1e9c7f6adc5ef4688c00fbe28db6f9d378bde5797338dd5654fb54f892c0d7574174b6e222b213779a0864b90dd3793cc16b93beea8b84aef1dcf75d054dcfdd473f164ed68b95e8573ed51e15e4a9fe717e51d57043f52718bec0fda29793fd0d5fe53790084bb74a8170182fa6bccb58dbe4877a29ba2381cffdfb6c096882d4b83b76d5eb0a71f9531dfd848c44f6028ceb5ad60853a6506fac72063d7210cb23defe164f56f0ab8551563186e958460125a5bf86b0c21602e2af3cb786012bdbbf69c14ce4a31c4b00ef75878c6e528c03e7b1abc9f40400868"}], 0x13b0}, 0x3}, {{&(0x7f00000003c0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000440)="fc9ec0dfb58bc5ab095d4e6ceee0274ca7a424c2ead5aa6357939460e17827f9fa51e840cb6d67d3beb0e3f9c56724e020d7f56486e3e3db9182fa7bd1ad87883ad3d30411808b86a8e1715a509ec3b28ee70a75d70b93c56e2df954", 0x5c}, {&(0x7f00000004c0)="cd0af7862dcd617523d59aa81e61b9032cbb5283423c25594c82241702c42ca3497e2fa9a761bf6df89273a0bba6c6bad0ea224a7f49cdf7288e48b2cb116290408b7f79a73c92a7c273aa659dcf7f5a42c9eae7dc4f306f36bec8d0bfef34b34dbbb74dd578e794ec32e8d971a49b77bbdac221504be034be5d7250c80a8dc8e89707c6c781f5297036c4b8433ba66ade8fd5b7dfc937d6842a4b570bea7c2ce7514123f929ff4a7a25c80fa78e7a0d", 0xb0}, {&(0x7f0000000580)="6ba3cfc0de36326f026dc46e9b73d6529dc9b48046", 0x15}], 0x3, &(0x7f0000002680)=[{0xf8, 0x0, 0x9, "7f79260fae42ca5cc9f0f67a3b89d142d1d2fbf2b8a2087bf1906e99ede14e3d90527c1e52f19e6a5b6fee907b8002b0be674fa7dd5ec9dbb74fd1eba2426aa0db787f4a3d1a835f9864ea7912eae42ef2e073b038a41a58a4d7297c5999075cb71cd6d6b867b49fc1f21f67411b7aff811316e4b1637cf06b15017f60b65bd456a51006992661121ffb54f34794aa48327c3748545415cd0f1260c0a05d95e0c61548bc9340ace95e2c19438fbc5dbd8c1d006ef307d415eb6b42aac8c84ec75d4fae41ac27a42269eb5b3b9bbd671d7c2e2960a439d8abdd464f8326ae71a5fb1b"}, {0x78, 0x0, 0x401, "a3092ed9395421f0918d676e79e6cec99dca1d162ac73e01a024e8a006327a298717f85a455f4ed0ecbde51868303782a427c0a8818dfa708cee21b80916ca968ca22ef21c182828af400b583b973b371fa4c49a9311b3ff71f22abd2f77cae5f32a"}, {0xa0, 0x119, 0xffffffffffffffe1, "ca99eadf48b4d5c44e41ba9e9529525fb2b62c6c0c6d38a85d7f9ad80fef5fb5d2f52826f0d78da6db53df5dd1e5b4c5ce89573c89a1b81a34dc33cf7f73d8fe81af9a17ed8457d683cb796b17913cb6aa3ed0063c428583414f06e0678f25e7e92db107dd065a1428fc3bba9f274dfb83354742f503eff771b5578d41f1e8459d0586a5446dac9d60"}, {0x1010, 0xff, 0x6, "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"}, {0xd8, 0x3a, 0x7, "2ac89541d8a050c0be2fc77df2e378bc812d90a108d42b0b8a158248d4287054094c3e9c848dc1be80293892d1820cf7c5b094da4efaad1a7d6a9620bf534a183d0906d1822711bc8ca39962889c99d110bd9cb04805320d663983dbac5e2af4fe7b57cffb4931815e1dad4420b6f55f02bad2fa59dcfd943688bb2303d3ecdb2eba7967b725794e48c3276ca801b05f9d2af2e6bd3ee0633f4afaa246ddf27252924fce7d73e1de9d571e7986b0ff779041338c97c4cf06e0ad606467eb02c122d3"}, {0xc8, 0x1ff, 0x4, "e48e4fbab0db77ee151e52376e7ba863b9bfcda963e8fdaeb81b05ed335591336b13ff9a147f0ac46b385a22192cd773e74b0c534ec44180305dde51b67fc8c08d0f660f29e666a0bff18f35ec61be28d851cc5f6f2f1a61f5d0373013fdd171e787b7f86d06ffd07263995a990e16dd59f790feae98badd3f6ea03cf17422ed73a4b31de2a1ce5e4ebbb7a3f015ed8d11c0cc3d970eaba7c30598fcedbd5fbcf9975608882eeec72af730c5a3272313ead4"}, {0x60, 0x13b, 0x401, "dc3fa19454a89e8863caa9ca659ee601929a206005379b7b7c9b262b121e1039536babfd4518fae99cf3d841b0456e73035bfb7f1c10f32e421cfb9eb39a50845a5b9a0045079519c0016d"}, {0x40, 0x105, 0x101, "495ac43ecb97ed8bdc81ddec2fc26c4c0c6daef754da85cdab35f5a1b3afe87f6992e4656b15b8b90e089253e92e4d"}, {0xa8, 0x117, 0x0, "e4cd0a32519bad0f2d64d35f31eb954f62276f8149337f0e8948721f5f2ac8f7d4466213f42e7a23e9f5aca6bd5d8a81e200b940bb1b1941915b694a60c6261b7df4e4173c3af4f682f18e1c7e833595d38ea90f3f516d466c3ab731d987e0d1162eb3c645d6f38d15f0ad475330c39625341bd99a681c45cb72fdcbc7ed4f03c7c7641a48a766d6d0af45ef6d432dee3a"}], 0x1508}, 0x6}, {{&(0x7f0000000600)=@rc={0x1f, {0x8001, 0xda41, 0xfff, 0x9, 0x7f, 0x4}, 0x66}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)="1367fc2d0f6708c4946bfaa46a51b65f0ba0346e29", 0x15}, {&(0x7f0000003bc0)="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", 0x1000}, {&(0x7f00000006c0)="536f16cd5d50692b6fa924420d9c3b3da2e2822e9e71f8fd082f48e6f69c79ce83d58a0764936ee4cc8832b1a417bc9c26ea09be9b52a5ca830bbdb9e12c39f5c3d5e8d5d178697fab13c0e08fb2e818e4001311f19e0a1e82f3796750b9d5084c021a30d82c8813038134b4ac881e67a87033442dde57c37a789c9e26e42c347aec45a6e932756940592569e6d0b476f4183323b9f259ac", 0x98}, {&(0x7f0000004bc0)="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", 0x1000}, {&(0x7f0000000780)="717d2429195df818a4dc7ed01e602106ba12fb97f3e454533fa755a913442fae6ecb212dff019a578ebc25", 0x2b}, {&(0x7f00000007c0)="3051b27f0efc50ce70759d03924d23355087d41c51474d717427409ce6f0c628e83642d5a066e16ac9f38b9b73cf442fa64650d52ce307e3a2b294e891970e78bbc5278b3fde5039850d4108355280bf3d734c889d7e", 0x56}, {&(0x7f0000000840)="508d1fb642fc89c0e646ec556e10df788b390e8df061a9a8d5df83ba3a2172a5e83c21ece25c4142ffd529c30f51ddf385c9180db2299ec9d6df445423a58ee1a691b7ab0c6c099183b2ded41e9c05341304647bb70029bf7c2529651813340e4752761ea94562cd62d567552dfe9c763a5fe2e1af3fbd36bdbd3a423ca4fa820db93e6619a2d967e30af74d8115899eadddd3574857d1a4c9e25a2b8ea54fe16ece45dbd5f2b6d82a585c4fe301d5df7a66d6778ba55619d4edfe20050036c16c61eafab2e304d7de1344debd94", 0xce}, {&(0x7f0000000940)="b72691456717da7e584622edc54fbdbb28eb33f9905752421d00b7f69134b0ee00e025003c69365b62db491a1b26ce9d", 0x30}], 0x8}, 0x2}], 0x3, 0x20004000) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="8852dc7c79f954f9516250a99ecd903a28b476db5d66217a", 0x18}], 0x1}}], 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000c00)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000c40)={@mcast2, 0xf, r3}) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 23:02:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80abdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0001d818008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1015.276700] XFS (loop3): unknown mount option [euid<00000000000000000000]. [ 1015.474457] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000f018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008108e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:09 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$llc(r0, &(0x7f0000000480), &(0x7f00000004c0)=0x10) memfd_create(&(0x7f00000002c0)='lowlan1(self[!\x00', 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000280)=""/5, 0x5) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffff7f]}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002f80)={r2}) sendmsg$kcm(r3, &(0x7f0000005c80)={&(0x7f0000002fc0)=@isdn={0x22, 0x100, 0x5, 0x6, 0x8f37}, 0x80, &(0x7f0000004680)=[{&(0x7f0000003680)="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", 0xfbf}], 0x1}, 0x1) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) bind$alg(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) 23:02:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfeffffff00000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80bcdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:09 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0xffffffffffffff65, 0xf3e, 0x8, 0x1, 0x8}) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x7f, 0x3, 0x2, 0x7, 0x1}) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x5) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x9, {0xe938, 0x8, 0xc81a, 0x5, 0x5c91, 0x10000}}) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000140)={0x100000001, 0x3, 0x20, 0x1, 0x5}) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000001c0)={0x1, &(0x7f0000000180), 0x2, r0, 0x3}) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000200)) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x1f, 0x40) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000340)={0xa, 0x4, 0xfa00, {r2}}, 0xc) accept4$tipc(r0, &(0x7f0000000380)=@name, &(0x7f00000003c0)=0x10, 0x80000) getgroups(0x5, &(0x7f0000000400)=[0xee00, 0xee00, 0xee01, 0xee00, 0xffffffffffffffff]) ioctl$TUNSETGROUP(r0, 0x400454ce, r3) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000440)={0x1000, 0xcb5e, 0x3, "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"}) write$P9_RCREATE(r0, &(0x7f0000001480)={0x18, 0x73, 0x1, {{0x7d, 0x2, 0x5}, 0x800}}, 0x18) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000014c0)={0xfff}, 0x4) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000001500)) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000001540)={0x0, 0x0, 0x100, 0x7, {0x1ff, 0x8, 0x8, 0x7fff}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000015c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001580)={0xffffffffffffffff}, 0x13f}}, 0x20) bind$isdn(r0, &(0x7f0000001600)={0x22, 0x79, 0xfffffffffffffffa, 0x5, 0x2}, 0x6) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000001640)) setsockopt$rose(r0, 0x104, 0x4, &(0x7f0000001700)=0x5, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000001740)={0xa, 0x4, 0xfa00, {r4}}, 0xc) name_to_handle_at(r0, &(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x72, 0x9, "1f4b4451075c58538a8adf290ca1e2be7dad35707eb652a33565c9890ee9bdbbc5a88ceee358eccbb1105fca03d14d4164e160b83c23724f22f52d4965e9cd264377bc876b2d027aaedf93c745430c7bdb6fa6290aba10ffe02f36a8e7c5816e9e1650134070633e08e0"}, &(0x7f0000001840), 0x1400) openat$ion(0xffffffffffffff9c, &(0x7f0000001880)='/dev/ion\x00', 0x40000, 0x0) [ 1016.130218] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xffffff7f00000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000200008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1016.521986] kauditd_printk_skb: 279 callbacks suppressed [ 1016.522002] audit: type=1400 audit(1550617329.934:37874): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1016.699849] audit: type=1400 audit(1550617329.934:37875): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1016.863874] audit: type=1400 audit(1550617329.934:37876): avc: denied { map } for pid=904 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.069443] audit: type=1400 audit(1550617329.934:37877): avc: denied { map } for pid=904 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ae00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0xe6) [ 1017.237998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=987 comm=syz-executor.4 [ 1017.239377] audit: type=1400 audit(1550617329.934:37878): avc: denied { map } for pid=905 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.400706] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1024 comm=syz-executor.4 [ 1017.454484] audit: type=1400 audit(1550617329.934:37879): avc: denied { map } for pid=905 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1017.512536] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1017.517379] audit: type=1400 audit(1550617329.934:37880): avc: denied { map } for pid=905 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.586504] audit: type=1400 audit(1550617329.964:37881): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xffffffff00000000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80c2db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$packet(0x11, 0xffffffffff800003, 0x300) socket(0x0, 0x0, 0x1) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6gre0\x00', 0x2) syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0xfffffffffffffd43) clock_gettime(0x0, &(0x7f0000000100)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0af83e6e70123f3188a070") r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0], 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{&(0x7f0000000440)=@nfc, 0x0, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/30}, {&(0x7f0000000500)=""/120}, {&(0x7f0000001240)=""/4096}, {&(0x7f0000000580)=""/40}, {&(0x7f0000002240)=""/4096}, {&(0x7f0000004540)=""/155}, {&(0x7f0000000680)=""/15}, {&(0x7f00000006c0)=""/65}, {&(0x7f0000003240)=""/4096}], 0x0, &(0x7f0000000800)}, 0xfff}, {{&(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/125}], 0x0, &(0x7f0000004780)=""/4096}, 0xff}, {{&(0x7f0000000980)=@hci, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000a00)=""/205}], 0x0, &(0x7f0000000b40)=""/229}, 0x20730000000000}, {{&(0x7f0000000c40)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000cc0)=""/8}, {&(0x7f0000000d00)=""/122}], 0x0, &(0x7f0000000dc0)=""/232}, 0x100000000}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000000ec0)=""/127}, {&(0x7f0000000f40)=""/54}, {&(0x7f0000000f80)=""/183}, {&(0x7f0000001040)=""/90}, {&(0x7f00000010c0)=""/206}, {&(0x7f0000004240)=""/111}], 0x0, &(0x7f0000004340)=""/132}, 0x1}], 0x1, 0x10000, 0x0) ppoll(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000300)={0x401}, 0x8) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x7fffffffff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0xfece) ioctl$FICLONERANGE(r4, 0x4020940d, 0x0) socket$unix(0x1, 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x20200, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100), 0x13f698e4b9e299b7, 0x1, 0x0, 0xffffffffffffff06) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e24, 0x0, @initdev}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x5, 0xfffffffffffffff9, 0x5, 0xffffffffffff7fff, 0x8a, 0xede5, 0xe2e5, 0x9]}, 0x5c) shutdown(r0, 0x1) socketpair$unix(0x1, 0x4000000000001, 0x0, &(0x7f0000000240)) [ 1017.821282] audit: type=1400 audit(1550617329.984:37882): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.917263] audit: type=1400 audit(1550617329.994:37883): avc: denied { map } for pid=904 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1017.945538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=1039 comm=syz-executor.4 [ 1018.015992] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1018.017589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=1054 comm=syz-executor.4 23:02:11 executing program 3: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='nls=']) 23:02:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810be00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfffffffffffff000, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb90f0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES64]) [ 1018.828128] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfaa, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x40002, 0x0) [ 1018.981454] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x2, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ce00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1019.173700] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x404000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x3ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r3, 0x3f7, 0x20, 0x739, 0x100000001}, &(0x7f0000000180)=0x18) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x6, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'gre0\x00', 0x100}) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) lseek(r0, 0x0, 0x2) 23:02:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb9100a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x3, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setgroups(0xffffffffffffffee, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000040)=""/68, &(0x7f00000000c0)=0x44) sendfile(r1, r0, 0x0, 0x1) [ 1020.489021] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1020.506648] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 1020.585833] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001800810ee00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1020.862498] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:14 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x1, 0x9917, 0xffff}, 0x0) r2 = semget$private(0x0, 0x5, 0x100) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x15) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0xc02, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000811) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300)=0x8, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0xfffffffffffffff7, @local, 0x2}, @in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x28}, 0x8000}, @in6={0xa, 0x4e23, 0x1, @mcast1, 0x6}, @in6={0xa, 0x4e24, 0x3, @mcast1, 0x8}, @in6={0xa, 0x4e20, 0x1000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x22}, 0xcd29}], 0xc8) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}}}, 0x118) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x5, 0x1}, &(0x7f00000002c0)=0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) unshare(0x40000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000400)={0x6eb0, 0x7, 0x4, 0x2000008, {}, {0x7, 0xd, 0x8, 0x8, 0x7, 0x100000001, "a5f3ff32"}, 0x8000, 0x3, @fd=r1, 0x4}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/status\x00', 0x0, 0x0) 23:02:14 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x1, &(0x7f00000004c0)={'trans=unix,', {[{@access_uid={'access'}}, {@access_uid={'access'}}], [{@fowner_lt={'fowner<'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/vhost-vsock\x00'}}, {@dont_appraise='dont_appraise'}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/autofs\x00'}}]}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'nlmon0\x00', 0x400}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000600)) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1b) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000003c0)={{0xa00000000000000, 0x0, 0xfc, 0x8000, 0x5, 0xffffffff}, 0x2}) write$P9_RMKNOD(r1, &(0x7f0000000340)={0x14, 0x13, 0x2, {0x73, 0x2, 0x5}}, 0x14) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:02:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x4, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1021.143330] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb9c00a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1021.532655] kauditd_printk_skb: 268 callbacks suppressed [ 1021.532671] audit: type=1400 audit(1550617334.944:38150): avc: denied { map } for pid=1145 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1021.719186] audit: type=1400 audit(1550617334.994:38151): avc: denied { map } for pid=1141 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1021.731415] IPVS: ftp: loaded support on port[0] = 21 [ 1021.795249] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008110e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1021.939631] audit: type=1400 audit(1550617334.994:38152): avc: denied { map } for pid=1145 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.013850] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1022.096269] audit: type=1400 audit(1550617335.004:38153): avc: denied { map } for pid=1141 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.271997] overlayfs: workdir and upperdir must reside under the same mount 23:02:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x5, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1022.327964] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 1022.334106] audit: type=1400 audit(1550617335.034:38154): avc: denied { map } for pid=1145 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.547279] audit: type=1400 audit(1550617335.044:38155): avc: denied { map } for pid=1141 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.743836] audit: type=1400 audit(1550617335.054:38156): avc: denied { map } for pid=1145 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1022.882257] audit: type=1400 audit(1550617335.074:38157): avc: denied { create } for pid=1142 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1022.918494] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:02:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e10480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008160e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1022.984754] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1023.043437] audit: type=1400 audit(1550617335.164:38158): avc: denied { map } for pid=1145 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1023.142539] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1023.145097] audit: type=1400 audit(1550617335.164:38159): avc: denied { map } for pid=1145 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1023.251509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1023.368245] overlayfs: failed to resolve './file1': -2 23:02:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x6, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e17480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1023.953351] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1024.130277] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1024.287237] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000180081001b0f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e10480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a4817181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x7, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1025.618971] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1025.644738] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1025.711639] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:02:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000218008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:19 executing program 0: clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) creat(0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) socket$nl_netfilter(0x10, 0x3, 0xc) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000200)={0x1, 0x7, 0x6, 0x5, 0x1, [{0x7, 0xfffffffffffffffc, 0xffffffffffff0001, 0x0, 0x0, 0x1}]}) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x800, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="7b1af8010000000069a2f8ff00000000bf1fe3000000000095518aa7b38f9812a89a759d1f75bac687374ae16840b5b89235f184d9814a3c2e35074ab65beccad660238f3f23c5c283a36f1be021bc3ac1edf152124d2bf5f9cc5428cf6518f7a1b51ae5f0ee"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = accept4(r2, 0x0, 0x0, 0x20000000000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flistxattr(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x300000004000010}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1025.957420] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1026.042880] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 23:02:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x8, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e01780ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e0f1e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000318008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:19 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000000002000000000000000000000e6ffffffffffffff00000000000000000000"]) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000028bd7000fddbdf360c0000000c00090008000100a5853b9ef278f19fc2c737a7f683000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40800) ioctl$KDGKBLED(r0, 0xc0045401, &(0x7f0000a07fff)) [ 1026.539578] kauditd_printk_skb: 197 callbacks suppressed [ 1026.539592] audit: type=1400 audit(1550617339.944:38345): avc: denied { map } for pid=1358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x9, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1026.741066] audit: type=1400 audit(1550617339.944:38346): avc: denied { map } for pid=1358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000418008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1026.869446] audit: type=1400 audit(1550617339.954:38347): avc: denied { map } for pid=1358 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1027.024836] audit: type=1400 audit(1550617339.954:38348): avc: denied { map } for pid=1364 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:20 executing program 0: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$tipc(0x1e, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) quotactl(0x2, &(0x7f0000000540)='./file1\x00', r0, &(0x7f0000000580)="b1814181e55d3968db66dbee3c51cea73c90a3268fca6baab7961bae5dff3052c751af8b99538083b4bb2cabd434a33fb6363c3df2e4c749c774e72325714daaea8f3369358d69ddb8f5aaeb1cc0901464a38ed66304c27059bdcf541892971faa806e7d8d505ef6b57b355fd907fbbe3823b6716af6706c0fd4b5f2f8fca5672eebf9d115f1ac5db044aa015847079ac6380e490f1e0c9ec109ea9e7133f39b908ec3a33781abef8dfe61fb273de5bd313be9d4266915bceaab83a15f253e3f4ce3b28d802469e779a8379614718312d77522aef2df") mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x18) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000100)='./file0/file1/file0\x00', r2, r3, 0x400) rmdir(&(0x7f0000000080)='./file0/file1\x00') ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000680)=0x2) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000400)={{0x2004, 0x1, 0xe, 0x1e2000, 0x6, 0x800, 0x9, 0x4, 0x5, 0x9, 0x7fffffff, 0x7f52}, {0x100000, 0xd000, 0x10, 0xfffffffffffeffff, 0x8001, 0x5, 0x8, 0x2, 0x1, 0x2, 0xffffffff, 0xfffffffffffff518}, {0x1, 0x0, 0x9, 0x6, 0x1f, 0x27, 0xfffffffffffffff7, 0x400, 0x9, 0x3, 0x8, 0x1}, {0x6000, 0x104000, 0x10, 0x4, 0xfffffffffffffffa, 0x3, 0x4a9, 0x0, 0x7, 0x3, 0x1, 0xfffffffffffffffc}, {0x100002, 0x100000, 0xf, 0x3, 0x6, 0x9, 0x5d8000, 0x2, 0x8, 0xffffffffffff6381, 0x0, 0x4fa8}, {0x5000, 0x116003, 0x4, 0x1, 0x80000000, 0x6, 0x0, 0x7fffffff, 0x441a, 0x8, 0xffff, 0x941}, {0x10000, 0x1, 0x0, 0x2, 0x8, 0x3, 0x101, 0x0, 0x5, 0x7, 0x40, 0x10001}, {0x2, 0x0, 0xa, 0x0, 0x1f, 0x27e000, 0x6, 0x401, 0x0, 0x6, 0x3, 0x20}, {0xf001, 0x1}, {0xd000, 0x1}, 0x40033, 0x0, 0x102000, 0x40000, 0xc, 0x800, 0xf000, [0x1, 0x3, 0x1]}) [ 1027.114517] audit: type=1400 audit(1550617339.954:38349): avc: denied { map } for pid=1364 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1027.156017] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 23:02:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f79ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:20 executing program 3: r0 = socket(0x2, 0x803, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f0000390000)={0x2, 0x100000000000, @multicast2}, 0xd) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xe) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) write$capi20_data(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="10000800"], 0x12) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r1], 0x17) ftruncate(r0, 0x9) sendfile(r0, r1, 0x0, 0x200000072439a6d) write$P9_RRENAMEAT(r1, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) [ 1027.297651] audit: type=1400 audit(1550617339.984:38350): avc: denied { map } for pid=1364 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1027.496090] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1027.543921] audit: type=1400 audit(1550617339.984:38351): avc: denied { map } for pid=1360 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000518008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0xa, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1027.737196] audit: type=1400 audit(1550617339.984:38352): avc: denied { map } for pid=1358 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e101e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1027.799453] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1027.841324] audit: audit_lost=553 audit_rate_limit=0 audit_backlog_limit=64 23:02:21 executing program 0: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$tipc(0x1e, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) quotactl(0x2, &(0x7f0000000540)='./file1\x00', r0, &(0x7f0000000580)="b1814181e55d3968db66dbee3c51cea73c90a3268fca6baab7961bae5dff3052c751af8b99538083b4bb2cabd434a33fb6363c3df2e4c749c774e72325714daaea8f3369358d69ddb8f5aaeb1cc0901464a38ed66304c27059bdcf541892971faa806e7d8d505ef6b57b355fd907fbbe3823b6716af6706c0fd4b5f2f8fca5672eebf9d115f1ac5db044aa015847079ac6380e490f1e0c9ec109ea9e7133f39b908ec3a33781abef8dfe61fb273de5bd313be9d4266915bceaab83a15f253e3f4ce3b28d802469e779a8379614718312d77522aef2df") mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x18) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000100)='./file0/file1/file0\x00', r2, r3, 0x400) rmdir(&(0x7f0000000080)='./file0/file1\x00') ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000680)=0x2) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000400)={{0x2004, 0x1, 0xe, 0x1e2000, 0x6, 0x800, 0x9, 0x4, 0x5, 0x9, 0x7fffffff, 0x7f52}, {0x100000, 0xd000, 0x10, 0xfffffffffffeffff, 0x8001, 0x5, 0x8, 0x2, 0x1, 0x2, 0xffffffff, 0xfffffffffffff518}, {0x1, 0x0, 0x9, 0x6, 0x1f, 0x27, 0xfffffffffffffff7, 0x400, 0x9, 0x3, 0x8, 0x1}, {0x6000, 0x104000, 0x10, 0x4, 0xfffffffffffffffa, 0x3, 0x4a9, 0x0, 0x7, 0x3, 0x1, 0xfffffffffffffffc}, {0x100002, 0x100000, 0xf, 0x3, 0x6, 0x9, 0x5d8000, 0x2, 0x8, 0xffffffffffff6381, 0x0, 0x4fa8}, {0x5000, 0x116003, 0x4, 0x1, 0x80000000, 0x6, 0x0, 0x7fffffff, 0x441a, 0x8, 0xffff, 0x941}, {0x10000, 0x1, 0x0, 0x2, 0x8, 0x3, 0x101, 0x0, 0x5, 0x7, 0x40, 0x10001}, {0x2, 0x0, 0xa, 0x0, 0x1f, 0x27e000, 0x6, 0x401, 0x0, 0x6, 0x3, 0x20}, {0xf001, 0x1}, {0xd000, 0x1}, 0x40033, 0x0, 0x102000, 0x40000, 0xc, 0x800, 0xf000, [0x1, 0x3, 0x1]}) 23:02:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f802bdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1028.206579] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000618008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0xc, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f79ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:22 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[@ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYRESHEX=r0, @ANYBLOB="aae04552d3780140659a89733d51e2e7901b1489a34473fa68d5a87c84ebea8fbdf1cfad1baa04780bfb950fb3d4e7af90975bc8cfc386a0411a72cff3d796", @ANYRESOCT=r1, @ANYBLOB="ef0054ab5fdad8b9bffd42ff", @ANYPTR, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR64, @ANYPTR, @ANYPTR], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16=0x0, @ANYRES64=r2, @ANYPTR, @ANYRES16=r1, @ANYRESDEC=r2]], @ANYRESOCT=r0]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000280)={0x0, r1}) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)=0x242008) 23:02:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e111e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1029.194307] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000718008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0xe, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f8093db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:22 executing program 3: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="b48485e05683ce"], 0x7) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x8) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 23:02:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000001c0)={'ix6_\x81ti0\x00', 0x403}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000200)={'ip6gretap0\x00', 0x200}) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r1, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, 0x0) 23:02:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000818008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1030.049326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e121e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x10, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f8094db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000a18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1030.885925] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1031.030456] device nr0 entered promiscuous mode 23:02:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f8093db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1031.273869] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x60, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000b18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1031.568477] kauditd_printk_skb: 304 callbacks suppressed [ 1031.568492] audit: type=1400 audit(1550617344.974:38641): avc: denied { map } for pid=1714 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1031.626619] audit: type=1400 audit(1550617345.014:38642): avc: denied { map } for pid=1714 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1031.696153] audit: type=1400 audit(1550617345.024:38643): avc: denied { map } for pid=1714 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000c18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1031.768659] audit: type=1400 audit(1550617345.174:38644): avc: denied { map } for pid=1718 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1031.802231] audit: type=1400 audit(1550617345.204:38645): avc: denied { map } for pid=1718 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1031.837157] audit: type=1400 audit(1550617345.244:38646): avc: denied { map } for pid=1721 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1031.860480] IPv6: NLM_F_CREATE should be specified when creating new route 23:02:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e131e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1031.931129] audit: type=1400 audit(1550617345.244:38647): avc: denied { map } for pid=1721 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.037681] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1032.039702] audit: type=1400 audit(1550617345.244:38648): avc: denied { map } for pid=1720 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) dup2(r0, 0xffffffffffffffff) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101500, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000040)={0x1, 0x4, 0x0, 'queue1\x00', 0x100000000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0xfc92, &(0x7f0000000180)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x223, 0x6, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 23:02:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80a7db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x48000100, 0x0, 0x0, 0x0, 0x0) [ 1032.243513] audit: type=1400 audit(1550617345.394:38649): avc: denied { map } for pid=1724 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x86, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1032.384341] audit: type=1400 audit(1550617345.394:38650): avc: denied { map } for pid=1724 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000e18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1032.625279] IPVS: ftp: loaded support on port[0] = 21 23:02:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:02:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80abdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1032.868756] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000f18008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e141e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0xf0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100008915, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x24, r2, 0x201, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1033.386223] binder: 1758:1762 ioctl c018620c 20000380 returned -1 23:02:27 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x20000) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x10) mq_timedreceive(r0, &(0x7f0000000040)=""/5, 0x5, 0x6, &(0x7f0000000080)={0x77359400}) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000000c0)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000140)='syz1\x00') getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000180)={'broute\x00'}, &(0x7f0000000200)=0x78) write(r0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000300)=@int=0x9, 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x202180, 0x0) sendto$inet(r1, &(0x7f0000000380)="5f34df14101b44d91266c019943bdf87226f8db1ace68a82731aea63a0d41e455ad2e5216432e566a5da73f1986b6b06605259ef9ee7dc7a6f8765bfe08d684551c9ecb407db44cf592e2b6b260d8764ecab20aa9c06e8a6490e1150", 0x5c, 0x1, &(0x7f0000000400)={0x2, 0x4e24, @local}, 0x10) syz_open_pts(r1, 0x2000) r2 = getpid() sched_getaffinity(r2, 0x8, &(0x7f0000000440)) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x1, 0xffffffff80000000, 0x8, 0x8, 0x2, 0x3f, 0x7, 0x148, 0x40, 0x1ef, 0x200, 0x9, 0x38, 0x2, 0x8, 0x6, 0xffffffffffffffff}, [{0x70000007, 0x100, 0x100, 0x4, 0xe9, 0x78, 0xbba, 0xffffffff}, {0x6474e557, 0xff, 0x1, 0x2, 0x1000, 0x9, 0x1000, 0x1f}], "7282c41dce0e9d44746bca5a43935fdd3b6d234ebd21045b730bbadd8a9f3505251ed9ea28f681cd19ef087aa1dffa284fe29a378260ed007e5ee7a107bbc331dad282ed942148484640", [[], []]}, 0x2fa) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000780)=""/106, &(0x7f0000000800)=0x6a) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000940)={0x0, 0xc8, &(0x7f0000000840)=[@in6={0xa, 0x4e21, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e23, 0x6, @loopback, 0x6}, @in6={0xa, 0x4e22, 0x7, @loopback, 0xfffffffffffffffb}, @in6={0xa, 0x4e21, 0x5, @rand_addr="9fb4e46451d5c2a0fae192068b300430", 0x15e2}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e22, 0x7, @mcast2, 0xffffffffffffff7f}, @in6={0xa, 0x4e20, 0x4, @rand_addr="cff585696fd70fb181cfb8de2afb4925", 0x3}]}, &(0x7f0000000980)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000009c0)={r3, 0x0, 0x26, "feb79d05f61fb959b9724b650e7fc6d593fd15f9e48bf0b7b87cdc33d221e391cc07ac953723"}, 0x2e) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000a00)={0xe, 0x1, {0x57, 0x6, 0x0, {0xffffffffffff0001, 0x6f}, {0xfffffffffffffff8, 0x200}, @rumble={0x81, 0x101}}, {0x57, 0x200, 0x5, {0x100000001, 0x6}, {0x2, 0x2}, @rumble={0x2, 0x800}}}) ioctl$RTC_UIE_ON(r0, 0x7003) bind$pptp(r0, &(0x7f0000000a80)={0x18, 0x2, {0x1, @empty}}, 0x1e) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000ac0)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000b00)={{0xffffffffffffffff, 0x2, 0xfffe, 0x3, 0x5}, 0x1, 0x100000001, 'id0\x00', 'timer1\x00', 0x0, 0x5, 0x6de, 0xb24, 0x4}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000c00)=""/4096, &(0x7f0000001c00)=0x1000) bind$inet(r1, &(0x7f0000001c40)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000001c80), &(0x7f0000001cc0)=0x4) ioctl$TCSETS(r1, 0x5402, &(0x7f0000001d00)={0x981, 0x81, 0x36, 0xff, 0x1a, 0x8, 0x7, 0x0, 0x7fff, 0xffffffffffffff01, 0x40, 0x8}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001d40)={r3}, &(0x7f0000001d80)=0x8) accept4$inet(r0, &(0x7f0000001dc0)={0x2, 0x0, @dev}, &(0x7f0000001e00)=0x10, 0x80000) 23:02:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00001018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1034.320368] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00006018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80bcdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x300, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e151e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x0, 'wlc\x00', 0x26, 0x101, 0x10}, 0x2c) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89e9, 0x0) 23:02:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x101, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000140)={r3, 0x7}, 0x8) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x600000000000000, [0xc0000103, 0x0, 0x1000], [0xc2]}) [ 1035.316042] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x346, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1035.617658] IPVS: set_ctl: invalid protocol: 0 172.30.1.1:20004 [ 1035.953446] IPVS: set_ctl: invalid protocol: 0 172.30.1.1:20004 23:02:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80c2db4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1036.401469] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=1961 comm=syz-executor.4 23:02:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x5000aea5, &(0x7f0000000000)) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r3, &(0x7f00000000c0), 0x4) 23:02:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e161e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1036.577944] kauditd_printk_skb: 307 callbacks suppressed [ 1036.577958] audit: type=1400 audit(1550617349.984:38958): avc: denied { map } for pid=1972 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1036.638197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=2001 comm=syz-executor.4 23:02:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x347, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1036.740943] audit: type=1400 audit(1550617350.004:38959): avc: denied { map } for pid=1971 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1036.914327] audit: type=1400 audit(1550617350.004:38960): avc: denied { map } for pid=1971 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:30 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r1, &(0x7f00000000c0)={0x18}, 0x18) write(r1, &(0x7f00000012c0)="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", 0xfe9) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x1000000067, &(0x7f0000000180)=0x7fff, 0x3c9) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 1037.157762] audit: type=1400 audit(1550617350.034:38961): avc: denied { map } for pid=1972 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.306017] audit: type=1400 audit(1550617350.044:38962): avc: denied { map } for pid=1983 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.445484] audit: type=1400 audit(1550617350.094:38963): avc: denied { map } for pid=1983 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x2710, @host}, 0x80, &(0x7f0000000340)=[{&(0x7f00000005c0)="67da2839ffe6c92f88afa4b1cf86905445bb7232488659fae14ed635508996eb4bdb59a8e1cb5bb78bc86b34bc3d3224f7f94e759fe4ddff912bcd2f9396b1468360f13a898d47093d", 0x49}, {&(0x7f00000001c0)="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", 0xfb}, {&(0x7f00000002c0)="445a2c0ca973dc253f2d834a986a5e9028490ff62027b2baec7659e3da8bba68d70b769986b4f873775b14d0122d8daefd0cd8cf31787f835df3af68320a8df612f2348916c1f258f28b73f91195a5c1cfef72d6a2847a104ecd3ded81c3adb3468889b0b3538ed42a62d0b1934922981df1742d3b2acfbaf908", 0x7a}, {&(0x7f00000000c0)="81197a1ea4ded2a4ebe3e6cbeda3daaef661182c60266ae9f4f87c0e", 0x1c}], 0x4, &(0x7f0000000380)=[{0xfffffffffffffc45, 0x10d, 0x6f2, "f96d4051b9cee5990cee7228ee247df34a24324aa66010cda4f844a6bc01be43c3eb443539b7af33d8600a3de7a8ba5ba71b4df96fc38c693f0be2e2932c543e83b172dd2be051ef5c5ee8203b571e83f0ccc86e9a1952ab7194353c883566bb5f14086a9de725cd40e655114e045e3e144d79211a0342f7d0a04a65e225ec34fdb2debbda909e27940c84d18f511c582670879ef6f8e2ba490bf42971cef9fcd88c68c4365a26a688e5d09a22e4937c18bb03"}, {0x38, 0x0, 0x1, "e7a233ee38e4c724b53e67a9b65a4c24514d793dbb4bc5b9e7a282722d4ca45083a4c570f3"}, {0xc8, 0x0, 0x40, "ef72a08065208920dda5441c7b70f9bb608c4d0ceb386470eb238f40b03653e9297f87c0ae26365802e814d256f159a4bee2a3ffeba00108ab2ae40fb1d75520b23ca9e2a986efdf82a375ebdbbb6de76b3db952a04a53940d79585fd750ac4210df788073600d668ea74fe121d58f8f8d3ddb38d1761ad1dd2a3a67903d29556f33ee1341c5ba7ca42b72e009fb884e0ac089600cbf9d48ebe51ac3ba2fc770e1bf4443f390fbd8f1d4c6ae50d7626d5f69010f13"}], 0x1c8}, 0x4000) [ 1037.615213] audit: type=1400 audit(1550617350.114:38964): avc: denied { map } for pid=1983 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.618740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=2055 comm=syz-executor.4 [ 1037.762878] audit: type=1400 audit(1550617350.114:38965): avc: denied { map } for pid=1972 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.845277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=2116 comm=syz-executor.4 [ 1037.916520] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1037.926195] audit: type=1400 audit(1550617350.164:38966): avc: denied { map } for pid=1972 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:31 executing program 3: r0 = socket$inet6(0xa, 0x800006, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e1d}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140)={0x1, 0xffffffffffff7fff}, 0x8) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x20000004e21, @remote}, 0x10) r2 = accept(r0, 0x0, 0x0) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x1e9) sendmmsg(r1, &(0x7f0000000240)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x4b1, &(0x7f0000003b80), 0x0, &(0x7f0000000200)}}], 0x44b, 0x0) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) connect(r0, &(0x7f00000003c0)=@hci={0x1f, r3, 0x3}, 0x80) timerfd_gettime(r1, &(0x7f0000000040)) close(r1) 23:02:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb90f0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1038.080653] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000002e6008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5}) r2 = syz_open_pts(r1, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r4 = dup3(r2, r0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000001c0)="5771417059f01fda89ff921c295eb8eb9a3c07221a82c9cec2e155c239067e2a4dbd577c51f7ae039b55c4b066637a76fb31fb9731c0b546d9be5222d590809271eeb4b2c63573415bcf93fd7eb30a30255c03c1c031eef8de5fd4e3e5572d77b1ff86faf434545e4a41133970f7c41b307b59b80c0c774e5acf9d115a9c36fdc8f4666e26b943c3230d39f79ec57decf1dcdcfeea43aaedfc60934d6477f67dd382117f35416348f5380844a7b11e9f266540d140642105366de8b0c1f6cc09153fb0ce49122cb4deeac80e9d95b420cffe956c6f4a4a9ff765368836f2cedd7002", 0xe2}, {&(0x7f00000002c0)="040b59b120a58795dba15d15d07dc49c4c9e53bf6f1144dc16ff9c916ec192b0518bdb62723c88", 0x27}, {&(0x7f0000000300)="929da336fb57fb739108d5a4e39fcd2429de8058f6c2518915a474e70ab1aca7fe8f6e477759f73ccb7f0c4f7f11f2b1866133966c8355", 0x37}, {&(0x7f0000000340)="10113b4c5517404197240cb4af4a45974d2937bc6057091bc55d0c6cea15fda9b5b5f5952101102037ee657d97aa3f3906affba5adb016bc7acfedc68664d726aa7ce0213a14b6712802cdfcce0824e4f89cc885dba1b5be68f6addb147d127d3989e9bc976509bf983c8e2361b34351f1c0574e673a7face50289bc257fe5c065345891813a0ffda63b89c01dd9da05b64d366d0796c4345e4ebfc4b1d416fd08407718f9663ce7859a9a28a2b95d0ce4795246f6edb824c5f6dfa3aab36bf1094ee223b12f8c6ea4de431f3d9b681f9f818121a3d7c5a06b1c88633ca9cdd3679ac8b880669901057001dc7579c4eb91e7df1793a9bc", 0xf7}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB="30000000000000000900000001000000cd77b4405d2c9a4695feb7155e2023ac47b81201ae7ccc3e9578cd5170a2cc86a525dac903700f64f478", @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r5, @ANYRES32=r1, @ANYRES32=r4], 0x68, 0x8000}, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$TCXONC(r4, 0x540a, 0x1) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f0000000480)="71521d6e41e90e1708469330c377bffe85652b314f12836afa059e0f963474d9b45e778ff4c77f02046315614204e1fde73eaeebfcebf488a0105c38026f9ed0779155a4ef0e7739bef904d0dc8ceaaf96152820036596141d6597") [ 1038.108983] audit: type=1400 audit(1550617350.174:38967): avc: denied { map } for pid=1972 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e671e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x500, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1038.473658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=230 sclass=netlink_route_socket pig=2177 comm=syz-executor.4 [ 1038.675450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=230 sclass=netlink_route_socket pig=2186 comm=syz-executor.4 23:02:32 executing program 0: r0 = socket$packet(0x11, 0x4, 0x300) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0xeda9134ba70dfc8d, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0x94, 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3d, &(0x7f0000000100), 0x8) 23:02:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000000f008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1039.320389] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000002e6008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0bd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb9100a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x600, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1039.701046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=2307 comm=syz-executor.4 23:02:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb90f0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1039.846210] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=230 sclass=netlink_route_socket pig=2311 comm=syz-executor.3 [ 1039.878431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=2318 comm=syz-executor.4 23:02:33 executing program 3: socket(0x40000000015, 0x40000000000005, 0x0) 23:02:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000010008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb91b0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x4, &(0x7f0000000100)={0x80000001}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r2, &(0x7f00000000c0), 0x1bc05b29ea3f21a1) acct(&(0x7f0000000080)='./file0\x00') [ 1040.766323] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:34 executing program 0: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) syz_open_procfs(r0, &(0x7f0000000180)='net/icmp6\x00') r1 = socket$inet(0x2, 0x3, 0x9) getsockopt$inet_int(r1, 0x0, 0x18, &(0x7f00006ed000), &(0x7f0000000040)=0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) 23:02:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e17d300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1040.877904] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x700, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1041.199689] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000011008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb9c00a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:34 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) r5 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vboxnet1\x00', 0xfffffffffffffffc) r6 = add_key(&(0x7f0000001900)='logon\x00', &(0x7f0000001940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) ioctl$BLKRRPART(r3, 0x125f, 0x0) 23:02:35 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1041.655227] kauditd_printk_skb: 229 callbacks suppressed [ 1041.655242] audit: type=1400 audit(1550617355.064:39197): avc: denied { map } for pid=2459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1041.687364] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1041.853543] audit: type=1400 audit(1550617355.074:39198): avc: denied { map } for pid=2459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x900, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1041.941724] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e25d300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1042.003026] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 1042.017887] audit: type=1400 audit(1550617355.074:39199): avc: denied { map } for pid=2459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000012008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1042.227726] audit: type=1400 audit(1550617355.074:39200): avc: denied { map } for pid=2459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001800)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}], 0x1, 0x0) socket$inet6(0xa, 0x3, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000380)={0xffff, 0x0, 0x0, 0x1, 0x0, 0x5c, 0x392f, 0x0, 0x0, 0xfffffffffffffffd}) r2 = semget$private(0x0, 0x3, 0x84) semctl$GETPID(0x0, 0x5, 0xb, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000200), 0x4) getgroups(0x2, &(0x7f0000000680)=[0x0, 0x0]) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) io_setup(0x9, &(0x7f0000000400)=0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000005c0)=0x40) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) write$binfmt_script(r3, 0x0, 0x0) io_submit(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETNCNT(r2, 0x1, 0xe, &(0x7f0000000280)=""/199) lseek(r4, 0x0, 0x3) [ 1042.390166] audit: type=1400 audit(1550617355.174:39201): avc: denied { map } for pid=2459 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.562741] audit: type=1400 audit(1550617355.234:39202): avc: denied { map } for pid=2459 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.636205] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1042.783724] audit: type=1400 audit(1550617355.234:39203): avc: denied { map } for pid=2459 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:36 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) r5 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vboxnet1\x00', 0xfffffffffffffffc) r6 = add_key(&(0x7f0000001900)='logon\x00', &(0x7f0000001940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) ioctl$BLKRRPART(r3, 0x125f, 0x0) 23:02:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0xa00, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1042.939137] audit: type=1400 audit(1550617355.264:39204): avc: denied { map } for pid=2459 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.996669] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1043.034059] audit: audit_lost=559 audit_rate_limit=0 audit_backlog_limit=64 [ 1043.167349] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0c480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd30200bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1043.322654] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0xc00, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:36 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) r5 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vboxnet1\x00', 0xfffffffffffffffc) r6 = add_key(&(0x7f0000001900)='logon\x00', &(0x7f0000001940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) ioctl$BLKRRPART(r3, 0x125f, 0x0) 23:02:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000013008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:36 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20800, 0x8) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x3ff, 0x4) r1 = socket$inet(0x2, 0x80000, 0x1b) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x3, 0x9}, 0x0, 0x8, 0x100000001, {0x7fff}, 0xfffffffffffffc00, 0x6}) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2000001, 0x2011, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) chroot(&(0x7f0000000180)='./file0\x00') 23:02:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e14480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1043.783870] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0xe00, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:37 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) r5 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vboxnet1\x00', 0xfffffffffffffffc) r6 = add_key(&(0x7f0000001900)='logon\x00', &(0x7f0000001940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) ioctl$BLKRRPART(r3, 0x125f, 0x0) [ 1044.304667] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e17480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1044.525468] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 23:02:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd302e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000014008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1044.843862] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:38 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) r5 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vboxnet1\x00', 0xfffffffffffffffc) r6 = add_key(&(0x7f0000001900)='logon\x00', &(0x7f0000001940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) 23:02:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x4000, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:38 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0xfffffffffffffff9, 0x1}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x1, 0x18, 0x8000, 0x8cc8, 0x7, 0x8, 0xffffffffffffffe0, 0x0, r1}, 0x20) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x4, 0x18001) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1ffff) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000340)={"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"}) ioctl$SG_IO(r2, 0x2285, &(0x7f00000002c0)={0x20000000053, 0x0, 0x6, 0x0, @buffer={0xd, 0x4, &(0x7f0000000040)=""/4}, &(0x7f0000000100)="000005000002", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpid() ptrace$getsig(0x4202, r4, 0x7fff, &(0x7f00000001c0)) 23:02:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a4803181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1045.614518] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:02:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vboxnet1\x00', 0xfffffffffffffffc) add_key(&(0x7f0000001900)='logon\x00', &(0x7f0000001940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 23:02:39 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x4, 0x80c0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x141, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x0, @addr=0x4}, 0x8, 0x7, 0x1000}) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="64600f30f30f0966b802018ee80f01cff081a10b00000000000000c1904958a6b4de66baa100b850ff0000ef660f3a44f707c7442400d84df7dac7442402f6000000c7442406000000000f011424", 0x4e}], 0x1, 0x0, &(0x7f0000000140), 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x4, 0xfff, 0x9, 0x1, 0x29}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000300)={r2, 0x4}, &(0x7f0000000340)=0x8) mremap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) mbind(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 1045.823003] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1045.859661] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:02:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd304e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a4817181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x4603, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vboxnet1\x00', 0xfffffffffffffffc) 23:02:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a4803181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1046.681952] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1046.712935] kauditd_printk_skb: 285 callbacks suppressed [ 1046.712949] audit: type=1400 audit(1550617360.124:39489): avc: denied { map } for pid=2709 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1046.862523] audit: type=1400 audit(1550617360.124:39490): avc: denied { map } for pid=2710 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1046.931940] audit: type=1400 audit(1550617360.144:39491): avc: denied { map } for pid=2710 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1046.934454] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1046.957498] audit: type=1400 audit(1550617360.144:39492): avc: denied { map } for pid=2710 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:40 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000001780)={0x7fff, {{0xa, 0x4e20, 0x3f, @rand_addr="f939bc77407861cc077dbec183e60de2", 0x6}}}, 0x88) [ 1047.021742] audit: type=1400 audit(1550617360.174:39493): avc: denied { map } for pid=2709 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.037333] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1047.050963] audit: type=1400 audit(1550617360.174:39494): avc: denied { map } for pid=2709 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd305e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1047.123909] audit: type=1400 audit(1550617360.194:39495): avc: denied { map } for pid=2714 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000016008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x4703, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e0f1e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000015008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1047.290765] audit: type=1400 audit(1550617360.194:39496): avc: denied { map } for pid=2710 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.527618] audit: type=1400 audit(1550617360.194:39497): avc: denied { map } for pid=2710 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.701857] audit: type=1400 audit(1550617360.194:39498): avc: denied { map } for pid=2714 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:02:41 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/50, 0x32}, {&(0x7f00000014c0)=""/174, 0xae}, {&(0x7f0000001700)=""/78, 0xa013a3c273528481}], 0x7, &(0x7f0000001680)=""/29, 0x1d}, 0x12000) [ 1048.049006] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1048.108951] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:02:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x5865, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1048.350580] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:02:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000067008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="0f416063acf20e445ee8faeb58c6cc38", 0x10) [ 1048.709755] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. 23:02:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd306e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e101e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1048.801441] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=2757 comm=syz-executor.4 [ 1048.812351] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f00000003c0)=""/117, 0x75, 0x0, 0x0, 0x2}}, 0x68) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)=ANY=[]) write$vnet(r0, &(0x7f00000004c0)={0x1, {0x0, 0x0, 0x0, 0x3, 0x2}}, 0x68) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000100)={0x0, r1}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x880004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x204, r2, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x25830e3a}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x32}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x660c}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9db7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb222}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd0}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6a2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3d}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x735ce0d4}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x576479c3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xea9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x24000890}, 0x20008844) [ 1049.053087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=2763 comm=syz-executor.4 23:02:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x6000, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000e6028100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) openat$cgroup_procs(r3, &(0x7f0000001980)='tasks\x00', 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) [ 1050.069817] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.074958] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.101548] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=742 sclass=netlink_route_socket pig=2784 comm=syz-executor.4 [ 1050.194645] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:43 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) ioctl$RTC_UIE_OFF(r0, 0x7004) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) [ 1050.305229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=742 sclass=netlink_route_socket pig=2784 comm=syz-executor.4 23:02:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd308e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e111e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 23:02:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x6558, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:02:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018020000e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1050.549620] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.549662] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.554726] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.559861] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.569884] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.765338] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:02:44 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x4000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000001840)=r2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000001580)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f00000015c0)={r4}) ioctl$KDSETLED(r3, 0x4b32, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4004e23, @remote}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) 23:02:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0xa0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x8100, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1051.157281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=2814 comm=syz-executor.4 [ 1051.190965] protocol 88fb is buggy, dev hsr_slave_0 [ 1051.196570] protocol 88fb is buggy, dev hsr_slave_1 [ 1051.341451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=536 sclass=netlink_route_socket pig=2822 comm=syz-executor.4 23:02:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e121e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 1051.393803] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1051.509638] protocol 88fb is buggy, dev hsr_slave_0 [ 1051.743473] kauditd_printk_skb: 281 callbacks suppressed [ 1051.743487] audit: type=1400 audit(1550617365.154:39780): avc: denied { map } for pid=2831 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1051.875046] audit: type=1400 audit(1550617365.154:39781): avc: denied { map } for pid=2831 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1051.996692] audit: type=1400 audit(1550617365.174:39782): avc: denied { map } for pid=2831 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.093105] audit: type=1400 audit(1550617365.184:39783): avc: denied { map } for pid=2830 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.144641] audit: type=1400 audit(1550617365.204:39784): avc: denied { map } for pid=2830 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.172632] audit: type=1400 audit(1550617365.214:39785): avc: denied { map } for pid=2832 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.196716] audit: type=1400 audit(1550617365.214:39786): avc: denied { map } for pid=2832 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.255620] audit: type=1400 audit(1550617365.234:39787): avc: denied { map } for pid=2832 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.281206] audit: type=1400 audit(1550617365.244:39788): avc: denied { map } for pid=2830 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.306032] audit: type=1400 audit(1550617365.244:39789): avc: denied { map } for pid=2832 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1055.349639] net_ratelimit: 21 callbacks suppressed [ 1055.349648] protocol 88fb is buggy, dev hsr_slave_0 [ 1055.359735] protocol 88fb is buggy, dev hsr_slave_1 [ 1055.669611] protocol 88fb is buggy, dev hsr_slave_0 [ 1055.674709] protocol 88fb is buggy, dev hsr_slave_1 [ 1056.309654] protocol 88fb is buggy, dev hsr_slave_0 [ 1056.314786] protocol 88fb is buggy, dev hsr_slave_1 [ 1056.789620] protocol 88fb is buggy, dev hsr_slave_0 [ 1056.789626] protocol 88fb is buggy, dev hsr_slave_0 [ 1056.789710] protocol 88fb is buggy, dev hsr_slave_1 [ 1056.794740] protocol 88fb is buggy, dev hsr_slave_1 [ 1060.469647] net_ratelimit: 17 callbacks suppressed [ 1060.474659] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.479738] protocol 88fb is buggy, dev hsr_slave_1 [ 1060.949625] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.949660] protocol 88fb is buggy, dev hsr_slave_1 [ 1060.954745] protocol 88fb is buggy, dev hsr_slave_1 [ 1060.959867] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.969940] protocol 88fb is buggy, dev hsr_slave_1 [ 1061.589639] protocol 88fb is buggy, dev hsr_slave_0 [ 1061.594790] protocol 88fb is buggy, dev hsr_slave_1 [ 1061.909628] protocol 88fb is buggy, dev hsr_slave_0 [ 1065.749614] net_ratelimit: 20 callbacks suppressed [ 1065.749622] protocol 88fb is buggy, dev hsr_slave_0 [ 1065.759702] protocol 88fb is buggy, dev hsr_slave_1 [ 1066.069638] protocol 88fb is buggy, dev hsr_slave_0 [ 1066.074756] protocol 88fb is buggy, dev hsr_slave_1 [ 1066.709611] protocol 88fb is buggy, dev hsr_slave_0 [ 1066.714715] protocol 88fb is buggy, dev hsr_slave_1 [ 1067.189606] protocol 88fb is buggy, dev hsr_slave_0 [ 1067.189644] protocol 88fb is buggy, dev hsr_slave_1 [ 1067.194700] protocol 88fb is buggy, dev hsr_slave_1 [ 1067.199789] protocol 88fb is buggy, dev hsr_slave_0 [ 1070.869610] net_ratelimit: 16 callbacks suppressed [ 1070.869620] protocol 88fb is buggy, dev hsr_slave_0 [ 1070.879698] protocol 88fb is buggy, dev hsr_slave_1 [ 1071.349620] protocol 88fb is buggy, dev hsr_slave_0 [ 1071.349656] protocol 88fb is buggy, dev hsr_slave_1 [ 1071.354721] protocol 88fb is buggy, dev hsr_slave_1 [ 1071.359826] protocol 88fb is buggy, dev hsr_slave_0 [ 1071.369966] protocol 88fb is buggy, dev hsr_slave_1 [ 1071.989642] protocol 88fb is buggy, dev hsr_slave_0 [ 1071.994762] protocol 88fb is buggy, dev hsr_slave_1 [ 1072.309646] protocol 88fb is buggy, dev hsr_slave_0 [ 1076.149649] net_ratelimit: 21 callbacks suppressed [ 1076.149658] protocol 88fb is buggy, dev hsr_slave_0 [ 1076.159761] protocol 88fb is buggy, dev hsr_slave_1 [ 1076.469619] protocol 88fb is buggy, dev hsr_slave_0 [ 1076.474718] protocol 88fb is buggy, dev hsr_slave_1 [ 1077.109643] protocol 88fb is buggy, dev hsr_slave_0 [ 1077.114757] protocol 88fb is buggy, dev hsr_slave_1 [ 1077.589618] protocol 88fb is buggy, dev hsr_slave_0 [ 1077.589633] protocol 88fb is buggy, dev hsr_slave_0 [ 1077.594720] protocol 88fb is buggy, dev hsr_slave_1 [ 1077.599769] protocol 88fb is buggy, dev hsr_slave_1 [ 1081.269643] net_ratelimit: 18 callbacks suppressed [ 1081.269653] protocol 88fb is buggy, dev hsr_slave_0 [ 1081.279716] protocol 88fb is buggy, dev hsr_slave_1 [ 1081.749605] protocol 88fb is buggy, dev hsr_slave_0 [ 1081.749639] protocol 88fb is buggy, dev hsr_slave_1 [ 1081.754701] protocol 88fb is buggy, dev hsr_slave_1 [ 1081.759786] protocol 88fb is buggy, dev hsr_slave_0 [ 1081.769817] protocol 88fb is buggy, dev hsr_slave_1 [ 1082.389617] protocol 88fb is buggy, dev hsr_slave_0 [ 1082.394702] protocol 88fb is buggy, dev hsr_slave_1 [ 1082.709638] protocol 88fb is buggy, dev hsr_slave_0 [ 1086.549641] net_ratelimit: 21 callbacks suppressed [ 1086.554643] protocol 88fb is buggy, dev hsr_slave_0 [ 1086.559734] protocol 88fb is buggy, dev hsr_slave_1 [ 1086.869611] protocol 88fb is buggy, dev hsr_slave_0 [ 1086.874710] protocol 88fb is buggy, dev hsr_slave_1 [ 1087.509616] protocol 88fb is buggy, dev hsr_slave_0 [ 1087.514732] protocol 88fb is buggy, dev hsr_slave_1 [ 1087.989612] protocol 88fb is buggy, dev hsr_slave_0 [ 1087.989617] protocol 88fb is buggy, dev hsr_slave_0 [ 1087.989735] protocol 88fb is buggy, dev hsr_slave_1 [ 1087.994772] protocol 88fb is buggy, dev hsr_slave_1 [ 1091.669611] net_ratelimit: 16 callbacks suppressed [ 1091.669620] protocol 88fb is buggy, dev hsr_slave_0 [ 1091.679720] protocol 88fb is buggy, dev hsr_slave_1 [ 1092.149615] protocol 88fb is buggy, dev hsr_slave_0 [ 1092.149648] protocol 88fb is buggy, dev hsr_slave_1 [ 1092.154715] protocol 88fb is buggy, dev hsr_slave_1 [ 1092.159829] protocol 88fb is buggy, dev hsr_slave_0 [ 1092.169859] protocol 88fb is buggy, dev hsr_slave_1 [ 1092.789610] protocol 88fb is buggy, dev hsr_slave_0 [ 1092.794696] protocol 88fb is buggy, dev hsr_slave_1 [ 1093.109636] protocol 88fb is buggy, dev hsr_slave_0 [ 1096.949612] net_ratelimit: 17 callbacks suppressed [ 1096.949620] protocol 88fb is buggy, dev hsr_slave_0 [ 1096.959739] protocol 88fb is buggy, dev hsr_slave_1 [ 1097.269638] protocol 88fb is buggy, dev hsr_slave_0 [ 1097.274762] protocol 88fb is buggy, dev hsr_slave_1 [ 1097.909621] protocol 88fb is buggy, dev hsr_slave_0 [ 1097.914728] protocol 88fb is buggy, dev hsr_slave_1 [ 1098.389640] protocol 88fb is buggy, dev hsr_slave_0 [ 1098.389645] protocol 88fb is buggy, dev hsr_slave_0 [ 1098.389709] protocol 88fb is buggy, dev hsr_slave_1 [ 1098.394753] protocol 88fb is buggy, dev hsr_slave_1 [ 1102.069636] net_ratelimit: 17 callbacks suppressed [ 1102.069645] protocol 88fb is buggy, dev hsr_slave_0 [ 1102.079751] protocol 88fb is buggy, dev hsr_slave_1 [ 1102.549611] protocol 88fb is buggy, dev hsr_slave_0 [ 1102.549646] protocol 88fb is buggy, dev hsr_slave_1 [ 1102.554717] protocol 88fb is buggy, dev hsr_slave_1 [ 1102.564871] protocol 88fb is buggy, dev hsr_slave_0 [ 1102.569984] protocol 88fb is buggy, dev hsr_slave_1 [ 1103.189612] protocol 88fb is buggy, dev hsr_slave_0 [ 1103.194688] protocol 88fb is buggy, dev hsr_slave_1 [ 1103.509626] protocol 88fb is buggy, dev hsr_slave_0 [ 1107.349610] net_ratelimit: 20 callbacks suppressed [ 1107.349618] protocol 88fb is buggy, dev hsr_slave_0 [ 1107.359707] protocol 88fb is buggy, dev hsr_slave_1 [ 1107.669629] protocol 88fb is buggy, dev hsr_slave_0 [ 1107.674757] protocol 88fb is buggy, dev hsr_slave_1 [ 1108.309609] protocol 88fb is buggy, dev hsr_slave_0 [ 1108.314718] protocol 88fb is buggy, dev hsr_slave_1 [ 1108.789605] protocol 88fb is buggy, dev hsr_slave_0 [ 1108.789610] protocol 88fb is buggy, dev hsr_slave_0 [ 1108.789692] protocol 88fb is buggy, dev hsr_slave_1 [ 1108.794701] protocol 88fb is buggy, dev hsr_slave_1 [ 1112.469623] net_ratelimit: 16 callbacks suppressed [ 1112.474650] protocol 88fb is buggy, dev hsr_slave_0 [ 1112.479717] protocol 88fb is buggy, dev hsr_slave_1 [ 1112.949606] protocol 88fb is buggy, dev hsr_slave_0 [ 1112.949644] protocol 88fb is buggy, dev hsr_slave_1 [ 1112.954717] protocol 88fb is buggy, dev hsr_slave_1 [ 1112.964841] protocol 88fb is buggy, dev hsr_slave_0 [ 1112.969973] protocol 88fb is buggy, dev hsr_slave_1 [ 1113.589636] protocol 88fb is buggy, dev hsr_slave_0 [ 1113.594767] protocol 88fb is buggy, dev hsr_slave_1 [ 1113.909638] protocol 88fb is buggy, dev hsr_slave_0 [ 1117.749613] net_ratelimit: 21 callbacks suppressed [ 1117.749621] protocol 88fb is buggy, dev hsr_slave_0 [ 1117.759698] protocol 88fb is buggy, dev hsr_slave_1 [ 1118.069647] protocol 88fb is buggy, dev hsr_slave_0 [ 1118.074808] protocol 88fb is buggy, dev hsr_slave_1 [ 1118.709635] protocol 88fb is buggy, dev hsr_slave_0 [ 1118.714749] protocol 88fb is buggy, dev hsr_slave_1 [ 1119.189614] protocol 88fb is buggy, dev hsr_slave_0 [ 1119.189622] protocol 88fb is buggy, dev hsr_slave_0 [ 1119.189706] protocol 88fb is buggy, dev hsr_slave_1 [ 1119.194714] protocol 88fb is buggy, dev hsr_slave_1 [ 1122.869630] net_ratelimit: 16 callbacks suppressed [ 1122.869640] protocol 88fb is buggy, dev hsr_slave_0 [ 1122.879710] protocol 88fb is buggy, dev hsr_slave_1 [ 1123.349623] protocol 88fb is buggy, dev hsr_slave_0 [ 1123.349629] protocol 88fb is buggy, dev hsr_slave_0 [ 1123.349712] protocol 88fb is buggy, dev hsr_slave_1 [ 1123.354731] protocol 88fb is buggy, dev hsr_slave_1 [ 1123.359814] protocol 88fb is buggy, dev hsr_slave_0 [ 1123.374827] protocol 88fb is buggy, dev hsr_slave_1 [ 1123.989623] protocol 88fb is buggy, dev hsr_slave_0 [ 1123.994713] protocol 88fb is buggy, dev hsr_slave_1 [ 1128.149639] net_ratelimit: 22 callbacks suppressed [ 1128.154648] protocol 88fb is buggy, dev hsr_slave_0 [ 1128.159728] protocol 88fb is buggy, dev hsr_slave_1 [ 1128.469612] protocol 88fb is buggy, dev hsr_slave_0 [ 1128.474773] protocol 88fb is buggy, dev hsr_slave_1 [ 1129.109618] protocol 88fb is buggy, dev hsr_slave_0 [ 1129.114731] protocol 88fb is buggy, dev hsr_slave_1 [ 1129.589630] protocol 88fb is buggy, dev hsr_slave_0 [ 1129.589635] protocol 88fb is buggy, dev hsr_slave_0 [ 1129.589726] protocol 88fb is buggy, dev hsr_slave_1 [ 1129.594739] protocol 88fb is buggy, dev hsr_slave_1 [ 1133.269613] net_ratelimit: 18 callbacks suppressed [ 1133.269621] protocol 88fb is buggy, dev hsr_slave_0 [ 1133.279701] protocol 88fb is buggy, dev hsr_slave_1 [ 1133.749605] protocol 88fb is buggy, dev hsr_slave_0 [ 1133.749639] protocol 88fb is buggy, dev hsr_slave_1 [ 1133.754698] protocol 88fb is buggy, dev hsr_slave_1 [ 1133.764828] protocol 88fb is buggy, dev hsr_slave_0 [ 1133.769945] protocol 88fb is buggy, dev hsr_slave_1 [ 1134.389639] protocol 88fb is buggy, dev hsr_slave_0 [ 1134.394780] protocol 88fb is buggy, dev hsr_slave_1 [ 1134.709625] protocol 88fb is buggy, dev hsr_slave_0 [ 1138.549615] net_ratelimit: 18 callbacks suppressed [ 1138.549625] protocol 88fb is buggy, dev hsr_slave_0 [ 1138.559690] protocol 88fb is buggy, dev hsr_slave_1 [ 1138.869651] protocol 88fb is buggy, dev hsr_slave_0 [ 1138.874787] protocol 88fb is buggy, dev hsr_slave_1 [ 1139.509626] protocol 88fb is buggy, dev hsr_slave_0 [ 1139.514738] protocol 88fb is buggy, dev hsr_slave_1 [ 1139.989612] protocol 88fb is buggy, dev hsr_slave_0 [ 1139.989645] protocol 88fb is buggy, dev hsr_slave_1 [ 1139.994705] protocol 88fb is buggy, dev hsr_slave_1 [ 1140.004947] protocol 88fb is buggy, dev hsr_slave_0 [ 1143.669627] net_ratelimit: 15 callbacks suppressed [ 1143.669636] protocol 88fb is buggy, dev hsr_slave_0 [ 1143.679708] protocol 88fb is buggy, dev hsr_slave_1 [ 1144.149605] protocol 88fb is buggy, dev hsr_slave_0 [ 1144.149642] protocol 88fb is buggy, dev hsr_slave_1 [ 1144.154697] protocol 88fb is buggy, dev hsr_slave_1 [ 1144.164815] protocol 88fb is buggy, dev hsr_slave_0 [ 1144.169935] protocol 88fb is buggy, dev hsr_slave_1 [ 1144.789619] protocol 88fb is buggy, dev hsr_slave_0 [ 1144.794693] protocol 88fb is buggy, dev hsr_slave_1 [ 1145.109641] protocol 88fb is buggy, dev hsr_slave_0 [ 1148.949605] net_ratelimit: 21 callbacks suppressed [ 1148.949614] protocol 88fb is buggy, dev hsr_slave_0 [ 1148.959681] protocol 88fb is buggy, dev hsr_slave_1 [ 1149.269618] protocol 88fb is buggy, dev hsr_slave_0 [ 1149.274738] protocol 88fb is buggy, dev hsr_slave_1 [ 1149.909610] protocol 88fb is buggy, dev hsr_slave_0 [ 1149.914724] protocol 88fb is buggy, dev hsr_slave_1 [ 1150.389616] protocol 88fb is buggy, dev hsr_slave_0 [ 1150.389622] protocol 88fb is buggy, dev hsr_slave_0 [ 1150.389707] protocol 88fb is buggy, dev hsr_slave_1 [ 1150.394711] protocol 88fb is buggy, dev hsr_slave_1 [ 1154.069620] net_ratelimit: 18 callbacks suppressed [ 1154.069630] protocol 88fb is buggy, dev hsr_slave_0 [ 1154.080734] protocol 88fb is buggy, dev hsr_slave_1 [ 1154.549607] protocol 88fb is buggy, dev hsr_slave_0 [ 1154.549612] protocol 88fb is buggy, dev hsr_slave_0 [ 1154.549697] protocol 88fb is buggy, dev hsr_slave_1 [ 1154.554717] protocol 88fb is buggy, dev hsr_slave_1 [ 1154.559810] protocol 88fb is buggy, dev hsr_slave_0 [ 1154.574823] protocol 88fb is buggy, dev hsr_slave_1 [ 1155.189649] protocol 88fb is buggy, dev hsr_slave_0 [ 1155.194790] protocol 88fb is buggy, dev hsr_slave_1 [ 1159.349619] net_ratelimit: 20 callbacks suppressed [ 1159.349627] protocol 88fb is buggy, dev hsr_slave_0 [ 1159.359710] protocol 88fb is buggy, dev hsr_slave_1 [ 1159.669642] protocol 88fb is buggy, dev hsr_slave_0 [ 1159.674764] protocol 88fb is buggy, dev hsr_slave_1 [ 1160.309632] protocol 88fb is buggy, dev hsr_slave_0 [ 1160.314741] protocol 88fb is buggy, dev hsr_slave_1 [ 1160.789617] protocol 88fb is buggy, dev hsr_slave_0 [ 1160.789654] protocol 88fb is buggy, dev hsr_slave_1 [ 1160.794719] protocol 88fb is buggy, dev hsr_slave_1 [ 1160.804860] protocol 88fb is buggy, dev hsr_slave_0 [ 1164.469630] net_ratelimit: 15 callbacks suppressed [ 1164.469637] protocol 88fb is buggy, dev hsr_slave_0 [ 1164.479719] protocol 88fb is buggy, dev hsr_slave_1 [ 1164.949615] protocol 88fb is buggy, dev hsr_slave_0 [ 1164.949649] protocol 88fb is buggy, dev hsr_slave_1 [ 1164.954719] protocol 88fb is buggy, dev hsr_slave_1 [ 1164.964871] protocol 88fb is buggy, dev hsr_slave_0 [ 1164.970002] protocol 88fb is buggy, dev hsr_slave_1 [ 1165.589635] protocol 88fb is buggy, dev hsr_slave_0 [ 1165.594731] protocol 88fb is buggy, dev hsr_slave_1 [ 1165.909628] protocol 88fb is buggy, dev hsr_slave_0 [ 1169.749634] net_ratelimit: 21 callbacks suppressed [ 1169.754630] protocol 88fb is buggy, dev hsr_slave_0 [ 1169.759722] protocol 88fb is buggy, dev hsr_slave_1 [ 1170.069612] protocol 88fb is buggy, dev hsr_slave_0 [ 1170.074728] protocol 88fb is buggy, dev hsr_slave_1 [ 1170.709615] protocol 88fb is buggy, dev hsr_slave_0 [ 1170.714726] protocol 88fb is buggy, dev hsr_slave_1 [ 1171.189659] protocol 88fb is buggy, dev hsr_slave_0 [ 1171.189665] protocol 88fb is buggy, dev hsr_slave_0 [ 1171.189723] protocol 88fb is buggy, dev hsr_slave_1 [ 1171.194896] protocol 88fb is buggy, dev hsr_slave_1 [ 1174.869627] net_ratelimit: 18 callbacks suppressed [ 1174.869635] protocol 88fb is buggy, dev hsr_slave_0 [ 1174.879908] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.349615] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.349621] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.349703] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.354711] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.359795] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.374810] protocol 88fb is buggy, dev hsr_slave_1 [ 1175.989635] protocol 88fb is buggy, dev hsr_slave_0 [ 1175.994775] protocol 88fb is buggy, dev hsr_slave_1 [ 1180.149607] net_ratelimit: 20 callbacks suppressed [ 1180.149616] protocol 88fb is buggy, dev hsr_slave_0 [ 1180.159686] protocol 88fb is buggy, dev hsr_slave_1 [ 1180.469622] protocol 88fb is buggy, dev hsr_slave_0 [ 1180.474763] protocol 88fb is buggy, dev hsr_slave_1 [ 1181.109648] protocol 88fb is buggy, dev hsr_slave_0 [ 1181.114753] protocol 88fb is buggy, dev hsr_slave_1 [ 1181.589609] protocol 88fb is buggy, dev hsr_slave_0 [ 1181.589615] protocol 88fb is buggy, dev hsr_slave_0 [ 1181.589677] protocol 88fb is buggy, dev hsr_slave_1 [ 1181.594712] protocol 88fb is buggy, dev hsr_slave_1 [ 1185.269678] net_ratelimit: 18 callbacks suppressed [ 1185.269699] protocol 88fb is buggy, dev hsr_slave_0 [ 1185.279743] protocol 88fb is buggy, dev hsr_slave_1 [ 1185.749610] protocol 88fb is buggy, dev hsr_slave_0 [ 1185.749615] protocol 88fb is buggy, dev hsr_slave_0 [ 1185.749665] protocol 88fb is buggy, dev hsr_slave_1 [ 1185.754705] protocol 88fb is buggy, dev hsr_slave_1 [ 1185.759806] protocol 88fb is buggy, dev hsr_slave_0 [ 1185.774835] protocol 88fb is buggy, dev hsr_slave_1 [ 1186.389638] protocol 88fb is buggy, dev hsr_slave_0 [ 1186.394763] protocol 88fb is buggy, dev hsr_slave_1 [ 1190.549609] net_ratelimit: 19 callbacks suppressed [ 1190.549618] protocol 88fb is buggy, dev hsr_slave_0 [ 1190.559725] protocol 88fb is buggy, dev hsr_slave_1 [ 1190.869646] protocol 88fb is buggy, dev hsr_slave_0 [ 1190.874783] protocol 88fb is buggy, dev hsr_slave_1 [ 1191.509622] protocol 88fb is buggy, dev hsr_slave_0 [ 1191.514746] protocol 88fb is buggy, dev hsr_slave_1 [ 1191.989614] protocol 88fb is buggy, dev hsr_slave_0 [ 1191.989646] protocol 88fb is buggy, dev hsr_slave_1 [ 1191.994716] protocol 88fb is buggy, dev hsr_slave_1 [ 1191.999810] protocol 88fb is buggy, dev hsr_slave_0 [ 1195.669622] net_ratelimit: 15 callbacks suppressed [ 1195.669632] protocol 88fb is buggy, dev hsr_slave_0 [ 1195.679741] protocol 88fb is buggy, dev hsr_slave_1 [ 1196.149613] protocol 88fb is buggy, dev hsr_slave_0 [ 1196.149647] protocol 88fb is buggy, dev hsr_slave_1 [ 1196.154711] protocol 88fb is buggy, dev hsr_slave_1 [ 1196.164889] protocol 88fb is buggy, dev hsr_slave_0 [ 1196.170016] protocol 88fb is buggy, dev hsr_slave_1 [ 1196.789645] protocol 88fb is buggy, dev hsr_slave_0 [ 1196.794774] protocol 88fb is buggy, dev hsr_slave_1 [ 1197.109645] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.949648] net_ratelimit: 21 callbacks suppressed [ 1200.949657] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.959821] protocol 88fb is buggy, dev hsr_slave_1 [ 1201.269607] protocol 88fb is buggy, dev hsr_slave_0 [ 1201.274692] protocol 88fb is buggy, dev hsr_slave_1 [ 1201.909629] protocol 88fb is buggy, dev hsr_slave_0 [ 1201.914739] protocol 88fb is buggy, dev hsr_slave_1 [ 1202.389623] protocol 88fb is buggy, dev hsr_slave_0 [ 1202.389656] protocol 88fb is buggy, dev hsr_slave_1 [ 1202.394725] protocol 88fb is buggy, dev hsr_slave_1 [ 1202.404859] protocol 88fb is buggy, dev hsr_slave_0 [ 1206.069632] net_ratelimit: 17 callbacks suppressed [ 1206.069641] protocol 88fb is buggy, dev hsr_slave_0 [ 1206.079700] protocol 88fb is buggy, dev hsr_slave_1 [ 1206.309763] INFO: task syz-executor.0:2771 blocked for more than 140 seconds. [ 1206.317081] Not tainted 5.0.0-rc7+ #78 [ 1206.330084] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1206.338068] syz-executor.0 D27776 2771 8126 0x00000004 [ 1206.348976] Call Trace: [ 1206.353585] __schedule+0x817/0x1cc0 [ 1206.357626] ? __mutex_lock+0x721/0x1310 [ 1206.367151] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1206.374031] schedule+0x92/0x180 [ 1206.378266] schedule_preempt_disabled+0x13/0x20 [ 1206.388750] __mutex_lock+0x726/0x1310 [ 1206.395510] ? vhost_net_stop_vq+0x2d/0x120 [ 1206.405472] ? mutex_trylock+0x1e0/0x1e0 [ 1206.411571] ? kasan_check_write+0x14/0x20 [ 1206.416047] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1206.426657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1206.433604] ? wait_for_completion+0x440/0x440 [ 1206.438842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1206.451382] mutex_lock_nested+0x16/0x20 [ 1206.455680] ? mutex_lock_nested+0x16/0x20 [ 1206.464733] vhost_net_stop_vq+0x2d/0x120 [ 1206.469385] ? handle_rx_kick+0x50/0x50 [ 1206.477007] vhost_net_release+0x5d/0x260 [ 1206.485962] __fput+0x2df/0x8d0 [ 1206.492119] ____fput+0x16/0x20 [ 1206.495712] task_work_run+0x14a/0x1c0 [ 1206.504629] exit_to_usermode_loop+0x273/0x2c0 [ 1206.512290] do_syscall_64+0x52d/0x610 [ 1206.516492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.526171] RIP: 0033:0x411d31 [ 1206.532231] Code: be b3 34 01 00 00 31 c0 bf bb 36 44 00 e8 17 f3 00 00 8b b3 30 01 00 00 31 c0 bf d0 36 44 00 e8 05 f3 00 00 8b b3 08 01 00 00 <31> c0 bf e4 36 44 00 e8 f3 f2 00 00 8b 83 e0 00 00 00 48 89 ee bf [ 1206.549614] protocol 88fb is buggy, dev hsr_slave_0 [ 1206.551643] protocol 88fb is buggy, dev hsr_slave_0 [ 1206.556532] protocol 88fb is buggy, dev hsr_slave_1 [ 1206.561579] protocol 88fb is buggy, dev hsr_slave_1 [ 1206.566621] protocol 88fb is buggy, dev hsr_slave_0 [ 1206.576637] protocol 88fb is buggy, dev hsr_slave_1 [ 1206.577842] RSP: 002b:00007ffe20ec35f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1206.596381] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411d31 [ 1206.604092] RDX: 000000000000002f RSI: 0000000000742c18 RDI: 0000000000000003 [ 1206.618017] RBP: 0000000000000000 R08: 000000000010037d R09: 000000000010037d [ 1206.625691] R10: 00007ffe20ec3520 R11: 0000000000000293 R12: 0000000000000000 [ 1206.640142] R13: 0000000000000001 R14: 0000000000000484 R15: 0000000000000000 [ 1206.648488] [ 1206.648488] Showing all locks held in the system: [ 1206.662331] 1 lock held by khungtaskd/1040: [ 1206.666992] #0: 00000000256f8f2d (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1206.682925] 3 locks held by rs:main Q:Reg/7960: [ 1206.687803] #0: 000000006f6b8ce6 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1206.704604] #1: 00000000800b82da (sb_writers#4){.+.+}, at: vfs_write+0x429/0x580 [ 1206.716896] #2: 000000009aa6204d (&sb->s_type->i_mutex_key#9){++++}, at: __generic_file_fsync+0xb5/0x200 [ 1206.735317] 1 lock held by rsyslogd/7962: [ 1206.743001] #0: 00000000e1f6bb6d (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1206.756047] 2 locks held by getty/8084: [ 1206.763894] #0: 000000009ed043b0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1206.776775] #1: 0000000048278378 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1206.788511] 2 locks held by getty/8085: [ 1206.797983] #0: 000000005c6dc68b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1206.808802] #1: 00000000b42ca4e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1206.825866] 2 locks held by getty/8086: [ 1206.831694] #0: 00000000ebaf1a8c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1206.845332] #1: 0000000062be7f2d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1206.855959] 2 locks held by getty/8087: [ 1206.865289] #0: 000000004c8c3d25 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1206.875348] #1: 0000000065bd1233 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1206.891076] 2 locks held by getty/8088: [ 1206.895308] #0: 00000000323f38e5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1206.908899] #1: 00000000d2fd812b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1206.924904] 2 locks held by getty/8089: [ 1206.930797] #0: 00000000cfb9328c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1206.945233] #1: 00000000961bff53 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1206.956730] 2 locks held by getty/8090: [ 1206.966415] #0: 000000006c6c96e0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1206.976123] #1: 000000003cc88b6f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1206.992464] 2 locks held by syz-executor.3/21223: [ 1206.997597] #0: 00000000ec9e59d6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1207.014013] #1: 00000000840776a7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1207.026636] 1 lock held by syz-executor.0/2771: [ 1207.034844] #0: 00000000b5dc0bf4 (&vq->mutex){+.+.}, at: vhost_net_stop_vq+0x2d/0x120 [ 1207.046828] 1 lock held by vhost-2775/2778: [ 1207.054607] [ 1207.056770] ============================================= [ 1207.056770] [ 1207.067145] NMI backtrace for cpu 1 [ 1207.070924] CPU: 1 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc7+ #78 [ 1207.077772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.087122] Call Trace: [ 1207.089837] dump_stack+0x172/0x1f0 [ 1207.093482] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1207.098040] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1207.102978] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1207.108264] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1207.113457] watchdog+0x9df/0xee0 [ 1207.116977] kthread+0x357/0x430 [ 1207.120352] ? reset_hung_task_detector+0x30/0x30 [ 1207.125194] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1207.130751] ret_from_fork+0x3a/0x50 [ 1207.134525] Sending NMI from CPU 1 to CPUs 0: [ 1207.139611] NMI backtrace for cpu 0 [ 1207.139618] CPU: 0 PID: 2778 Comm: vhost-2775 Not tainted 5.0.0-rc7+ #78 [ 1207.139625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.139629] RIP: 0010:write_comp_data+0x0/0x70 [ 1207.139641] Code: 83 fa 02 75 20 48 8b 88 e0 12 00 00 8b 80 dc 12 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 5d c3 0f 1f 00 <65> 4c 8b 04 25 40 ee 01 00 65 8b 05 f0 0b 92 7e a9 00 01 1f 00 75 [ 1207.139646] RSP: 0018:ffff888058587a90 EFLAGS: 00000246 [ 1207.139655] RAX: ffff888058e325c0 RBX: 0000000000000000 RCX: ffffffff853d2a51 [ 1207.139661] RDX: 0000000000000000 RSI: 0000000000000010 RDI: 0000000000000006 [ 1207.139666] RBP: ffff888058587a98 R08: ffff888058e325c0 R09: ffffed100fff8da7 [ 1207.139672] R10: ffff888058587b68 R11: ffff88807ffc6d37 R12: 0000000000000010 [ 1207.139678] R13: 0000000000000000 R14: 0000000000000010 R15: dffffc0000000000 [ 1207.139684] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1207.139689] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1207.139695] CR2: ffffffffff600400 CR3: 000000002f10f000 CR4: 00000000001426f0 [ 1207.139700] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1207.139706] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1207.139709] Call Trace: [ 1207.139714] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1207.139718] iotlb_access_ok+0x421/0x540 [ 1207.139722] vq_iotlb_prefetch+0x114/0x230 [ 1207.139726] handle_rx+0x149/0x1900 [ 1207.139730] ? finish_task_switch+0x146/0x790 [ 1207.139734] ? find_held_lock+0x35/0x130 [ 1207.139738] ? finish_task_switch+0x146/0x790 [ 1207.139743] ? _raw_spin_unlock_irq+0x28/0x90 [ 1207.139747] ? finish_task_switch+0x146/0x790 [ 1207.139751] ? _raw_spin_unlock_irq+0x28/0x90 [ 1207.139755] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1207.139759] ? vhost_net_open+0x8e0/0x8e0 [ 1207.139763] ? trace_hardirqs_on+0x67/0x230 [ 1207.139767] ? kasan_check_read+0x10/0x20 [ 1207.139772] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1207.139775] ? inc_ucount+0x640/0x800 [ 1207.139779] ? __switch_to_asm+0x34/0x70 [ 1207.139783] ? __switch_to_asm+0x40/0x70 [ 1207.139787] ? __schedule+0x81f/0x1cc0 [ 1207.139792] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1207.139796] handle_rx_net+0x19/0x20 [ 1207.139799] vhost_worker+0x2a2/0x4a0 [ 1207.139804] ? vhost_flush_work+0x20/0x20 [ 1207.139808] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1207.139812] ? __kthread_parkme+0xfb/0x1b0 [ 1207.139816] kthread+0x357/0x430 [ 1207.139820] ? vhost_flush_work+0x20/0x20 [ 1207.139825] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1207.139829] ret_from_fork+0x3a/0x50 [ 1207.149047] Kernel panic - not syncing: hung_task: blocked tasks [ 1207.189610] protocol 88fb is buggy, dev hsr_slave_0 [ 1207.196385] CPU: 1 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc7+ #78 [ 1207.203742] protocol 88fb is buggy, dev hsr_slave_1 [ 1207.210917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.210923] Call Trace: [ 1207.210946] dump_stack+0x172/0x1f0 [ 1207.211047] panic+0x2cb/0x65c [ 1207.211064] ? __warn_printk+0xf3/0xf3 [ 1207.434539] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1207.439483] ? ___preempt_schedule+0x16/0x18 [ 1207.443901] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1207.449371] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 1207.454835] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 1207.460290] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1207.465746] watchdog+0x9f0/0xee0 [ 1207.469210] kthread+0x357/0x430 [ 1207.472575] ? reset_hung_task_detector+0x30/0x30 [ 1207.477439] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1207.483011] ret_from_fork+0x3a/0x50 [ 1207.487768] Kernel Offset: disabled [ 1207.491393] Rebooting in 86400 seconds..