setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x0, 0x1}, 0x20) 15:00:12 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000000203070000000800ca00000000000004000b000800030025000000"], 0x20}}, 0x0) 15:00:12 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000002f40)={&(0x7f0000000440), 0xc, &(0x7f0000002f00)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c00020008000a00001f0000683f2e76151b1687d3539dd1d6f9c5cae918eb293fef07e1d5cdf77f95c62d54c9bd6d581a70c668d41ba9bd5ef4d6702da10695f4b306419ec53799c07c8a41275c729b741b73"], 0x1}}, 0x0) 15:00:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000900)=ANY=[], &(0x7f0000001300)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) umount2(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r1, r0) 15:00:14 executing program 7: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r0, 0x0) r1 = accept4$inet6(r0, 0x0, &(0x7f0000000000), 0x0) fcntl$getflags(r1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) 15:00:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x88) recvmsg(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/18, 0x12}, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000002000)=ANY=[@ANYBLOB="10000080000000002900000000000000"], 0x10}}], 0x1, 0x8000) 15:00:14 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b80)}, 0x0) 15:00:15 executing program 5: io_setup(0xba, &(0x7f0000000000)=0x0) r1 = socket(0x2, 0x803, 0xff) memfd_create(&(0x7f00000000c0)='system[selfloppp0/[cpusetsecurity\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, &(0x7f0000000580)}]) [ 1417.175409] kauditd_printk_skb: 23 callbacks suppressed [ 1417.175418] audit: type=1400 audit(1536418821.449:14952): avc: denied { map } for pid=12286 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.240206] audit: type=1400 audit(1536418821.489:14953): avc: denied { map } for pid=12286 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.300142] audit: type=1400 audit(1536418821.489:14954): avc: denied { map } for pid=12286 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.380095] audit: type=1400 audit(1536418821.489:14955): avc: denied { map } for pid=12286 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.450300] audit: type=1400 audit(1536418821.509:14956): avc: denied { map } for pid=12286 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.500096] audit: type=1400 audit(1536418821.549:14957): avc: denied { map } for pid=12286 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.550086] audit: type=1400 audit(1536418821.549:14958): avc: denied { map } for pid=12286 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.600217] audit: type=1400 audit(1536418821.579:14959): avc: denied { map } for pid=12286 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.650116] audit: type=1400 audit(1536418821.579:14960): avc: denied { map } for pid=12286 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.700120] audit: type=1400 audit(1536418821.589:14961): avc: denied { map } for pid=12286 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:00:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xa7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x108101}, 0xc) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in, 0x0, 0x0, 0x0, 0xa2f}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 15:00:24 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) tee(r0, 0xffffffffffffffff, 0x0, 0x0) 15:00:24 executing program 0: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x200200, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) vmsplice(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000b00)) 15:00:26 executing program 1: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000ac0)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x200200, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(r0, &(0x7f0000000000)=""/20, 0x14, 0x40, 0x0, 0x0) 15:00:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/132, 0x84) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)) 15:00:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) dup2(r0, r1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) 15:00:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000006c0)=@add_del={0x2, &(0x7f0000000780)='bridge0\x00'}) r1 = socket$inet6(0xa, 0x803, 0x2000000003) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000280)={'bcsh0\x00'}) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0aaa2d0252926285717070") getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000009c0)={'IDLETIMER\x00'}, &(0x7f0000000a00)=0x1e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 15:00:28 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x20) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/143, 0x8f, 0x2, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in=@remote, @in6}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000001440)=0xe8) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000140)=0x54) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000004740)=0xe8) [ 1429.805284] kauditd_printk_skb: 12 callbacks suppressed [ 1429.805293] audit: type=1400 audit(1536418834.079:14974): avc: denied { map } for pid=12307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1429.890091] audit: type=1400 audit(1536418834.119:14975): avc: denied { map } for pid=12307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1429.955555] audit: type=1400 audit(1536418834.119:14976): avc: denied { map } for pid=12307 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.030106] audit: type=1400 audit(1536418834.119:14977): avc: denied { map } for pid=12307 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.080090] audit: type=1400 audit(1536418834.129:14978): avc: denied { map } for pid=12307 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.130093] audit: type=1400 audit(1536418834.149:14979): avc: denied { map } for pid=12307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.201076] audit: type=1400 audit(1536418834.149:14980): avc: denied { map } for pid=12307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.250097] audit: type=1400 audit(1536418834.149:14981): avc: denied { map } for pid=12307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.300091] audit: type=1400 audit(1536418834.149:14982): avc: denied { map } for pid=12307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.350128] audit: type=1400 audit(1536418834.209:14983): avc: denied { map } for pid=12307 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:00:41 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) creat(&(0x7f0000000000)='./file0\x00', 0x0) ptrace$setregset(0x4205, r0, 0x201, &(0x7f0000000180)={&(0x7f00000002c0)="8f", 0x1}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) delete_module(&(0x7f0000000080)='\x00', 0x0) 15:00:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={@mcast1, @loopback, @loopback}) 15:00:42 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth0_to_bond\x00', 0x10) close(r0) 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, &(0x7f0000000740)=""/98, 0x62}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001280)=0x800, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0) 15:00:46 executing program 7: syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 15:00:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) delete_module(&(0x7f0000000080)='\x00', 0x0) [ 1447.379906] kauditd_printk_skb: 12 callbacks suppressed [ 1447.379915] audit: type=1400 audit(1536418851.649:14996): avc: denied { map } for pid=12317 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.430088] audit: type=1400 audit(1536418851.679:14997): avc: denied { map } for pid=12317 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.480094] audit: type=1400 audit(1536418851.679:14998): avc: denied { map } for pid=12317 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:00:51 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0), &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffff67, &(0x7f0000000640)=0xb) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x200, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000180)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000003c0)={0x0}) r3 = mmap$binder(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xa8, 0x0, &(0x7f0000000440)=[@release={0x40046306, 0x2}, @increfs_done={0x40106308, r1, 0x4}, @transaction_sg={0x40486311, {{0x3, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000280)=[@fda={0x66646185, 0x7}, @fda={0x66646185, 0x7, 0x1, 0x16}, @ptr={0x70742a85, 0x0, &(0x7f0000000200), 0x1, 0x4, 0x1b}], &(0x7f0000000340)=[0x68, 0x20, 0x78]}, 0x3}}, @decrefs={0x40046307, 0x4}, @acquire, @acquire_done={0x40106309, r2}, @acquire={0x40046305, 0x4}, @acquire_done={0x40106309, r3, 0x4}], 0xa, 0x0, &(0x7f0000000500)="b450289f318fb856f958"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) rmdir(&(0x7f0000000240)='./file0//ile0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@dev={0xac, 0x14, 0x14, 0x18}, @in=@loopback, 0x4e22, 0x0, 0x4e22, 0xe000000000000000, 0x0, 0x80, 0x80, 0x0, 0x0, r4}, {0xa, 0x7, 0x4, 0x0, 0x9, 0x6, 0x40000000000000, 0xc1f}, {0x100000001, 0x0, 0x0, 0x8001}, 0x0, 0x6e6bbd, 0x1}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in=@multicast2, 0x3501, 0x2, 0x3, 0x1ff, 0x3ff, 0x0, 0x3}}, 0xe8) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) [ 1447.530089] audit: type=1400 audit(1536418851.679:14999): avc: denied { map } for pid=12317 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.580084] audit: type=1400 audit(1536418851.709:15000): avc: denied { map } for pid=12317 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:00:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet6_buf(r0, 0x6, 0x1e, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8088) [ 1447.630290] audit: type=1400 audit(1536418851.709:15001): avc: denied { map } for pid=12317 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.680869] audit: type=1400 audit(1536418851.729:15002): avc: denied { map } for pid=12317 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.740108] audit: type=1400 audit(1536418851.729:15003): avc: denied { map } for pid=12317 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.790099] audit: type=1400 audit(1536418851.729:15004): avc: denied { map } for pid=12317 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.842329] audit: type=1400 audit(1536418851.749:15005): avc: denied { map } for pid=12317 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:00:56 executing program 3: r0 = socket$inet6(0xa, 0xa, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local, {[], @tcp={{0x0, 0x1f4, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x20000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c100000", @ANYRES16=r3, @ANYBLOB="18002cbd7000fbdbdf2510000700080005007f0400003000020014000000000800040080020000080002004e200004080002004e2300003a9c2222b03cd405d589f8393b2893007ec1dcc37fae63c5d77fc830e534557eb5e8e5761a5e6310f57855144ce9f61d41fb96ba8c89300a1b3bb7232c08c185b6312500f0b67e002eb137cc5cb2b4508aa08f8404a34f331557033428c1527afe3ae39a7734c3ae44e30d319321a7899dcc870fc3bb6d0f2f"], 0x4c}, 0x1, 0x0, 0x0, 0x40001}, 0x40010) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x88a00, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000340)={0x10001, 0x6, 0xfffffffffffffffe}) 15:00:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) io_setup(0x8, &(0x7f0000000240)=0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) r3 = socket$packet(0x11, 0x3, 0x300) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x2, 0x722, 0x0, 0x6, 0x0, 0x800, 0x2201, 0x0, 0x0, 0x4, 0x0, 0x94c8, 0x200, 0x3ff, 0xfff, 0x9, 0x9, 0x4, 0x0, 0x833b, 0xfffffffffffff001, 0x4, 0x7, 0x80000000, 0x80000000, 0x62b, 0x1, 0x80, 0x2, 0x7, 0x40000000000000, 0x4, 0xad, 0x0, 0xf4, 0x6, 0x0, 0x3f1bffa3, 0x4, @perf_config_ext={0x8, 0x2}, 0x200, 0x0, 0x2e, 0x7, 0xfffffffffffffffb, 0xfffffffffffffff7, 0x9}, 0x0, 0x1, r4, 0x1) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r6 = dup3(r3, r3, 0x80000) r7 = socket$nl_route(0x10, 0x3, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000200)={'veth1\x00', 0x200}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x8, 0x0, [], [{0x100000000, 0x6c, 0x1, 0x5, 0x9, 0x5}, {0x2, 0x10001, 0x9, 0x7fff, 0x0, 0x7}], [[], [], [], [], [], [], [], []]}) pread64(r5, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b000000009e"], 0x28}}, 0x0) dup2(r3, r5) setsockopt$inet_udp_int(r6, 0x11, 0x67, &(0x7f0000000240)=0x5, 0x4) r8 = add_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000900)="e4d812ce9db29e0dcfc350f560b61ee166f7cf1bb11e7a66a14a4369c8e574b53300f814d099769116a4c42cdd6e14defc1f5e3784f995c8b96c58c8b653be38333267b158f3955322ccc04ade3982a28b7d215a496725b0b9f875943592289e7ddbeff251d2c2289c805ec5476e142d84ad354efe4fe070e1ce5533cc67f51d041dc9f1492df3ef0b27c4f5c083cebe", 0x90, 0xfffffffffffffff9) r9 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r8, 0x0, 0x0, r9) [ 1452.869579] kauditd_printk_skb: 12 callbacks suppressed [ 1452.869588] audit: type=1400 audit(1536418857.139:15018): avc: denied { map } for pid=12325 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1452.940115] audit: type=1400 audit(1536418857.149:15019): avc: denied { map } for pid=12325 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1452.980089] audit: type=1400 audit(1536418857.179:15020): avc: denied { map } for pid=12325 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.050096] audit: type=1400 audit(1536418857.179:15021): avc: denied { map } for pid=12325 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.100115] audit: type=1400 audit(1536418857.199:15022): avc: denied { map } for pid=12325 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.175630] audit: type=1400 audit(1536418857.209:15023): avc: denied { map } for pid=12325 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.253674] audit: type=1400 audit(1536418857.219:15024): avc: denied { map } for pid=12325 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.462685] audit: type=1400 audit(1536418857.219:15025): avc: denied { map } for pid=12325 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.493626] audit: type=1400 audit(1536418857.219:15026): avc: denied { map } for pid=12325 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.518248] audit: type=1400 audit(1536418857.319:15027): avc: denied { map } for pid=12327 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:01 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@dev, @rand_addr, 0x0}, &(0x7f0000000300)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14, 0x80000) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2020}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@mpls_newroute={0x74, 0x18, 0x301, 0x70bd2a, 0x25dfdbff, {0x1c, 0xb0, 0x0, 0x0, 0xfd, 0x1, 0xfe, 0x7, 0x2000}, [@RTA_DST={0x28, 0x1, [{0x3f, 0xbb, 0x4, 0x6}, {0x800, 0xfffffffffffffe01, 0x9, 0x9}, {0x40, 0x7, 0x2, 0x7}, {0x5, 0x0, 0x8000, 0x6}, {0x0, 0x2, 0x1, 0xfff}, {0x7, 0x80000001, 0x71a2, 0x7}, {0x7fff, 0xfffffffffffff3bf, 0x6, 0x10001}, {0x5, 0x100, 0x1, 0x8282}, {0x8, 0x3, 0xffff, 0xfffffffffffffff9}]}, @RTA_OIF={0x8, 0x4, r2}, @RTA_OIF={0x8, 0x4, r3}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x3f}, @RTA_OIF={0x8, 0x4, r4}, @RTA_OIF={0x8, 0x4, r5}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x3f}]}, 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x8080) write$selinux_load(r0, &(0x7f0000000600)={0xf97cff8c, 0x8, 'SE Linux', "b1ec6f3683ce9774fb8e6ab32892d70f51322faf112a0bbc348d29697d7244b6384f91b102edc007fcbc358786c821a98cc0b087078d73df3844f6f8841d2fecfeaf603178f9418417404656b66be4b69ca484352ac66ea6f47f825e9f221a9f3d4dade19c46d4462e4c11dd2473302b7ab00ab46f5f3d13d1d70eb10d367d51474492d7eb6f621c9f7f867c865c3017764523459cb3a385b6c668a6ac3decd8d0531176bb1db569eced17bd278a368c8803a0232d1fc3627e1d6d242d"}, 0xcd) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x7, 0xeb2, 0x7f, 0x3}, 'syz0\x00', 0x48}) ioprio_get$pid(0x2, r1) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x4, 0x4, 0x20000000000007}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000140)={r6, &(0x7f0000000000), &(0x7f000089b000)}, 0x18) 15:01:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000300)=""/135, &(0x7f0000000000)=0x87) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000180), &(0x7f0000000200)=0x4) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000240)={0x7fffffff, {{0x2, 0x4e22, @dev}}}, 0x88) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) sendfile(r3, r4, &(0x7f0000d83ff8)=0xf00, 0x8000fffffffe) socket$packet(0x11, 0xa, 0x300) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001b80)) 15:01:02 executing program 2: munlockall() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) sendmmsg(r1, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f00000021c0)="ce9d3888eb3bceba5af63f8d6437cd289f99007c760e2e0733fba58f58e7d11051a96e24c5dac325560475f1fb0de213617f60696cdd3d77458ccf5996e4d20f8d9765a804b4d89b18e03f1a2456316d0b459480c4ad61ad57b5236226e75520e1f9840f961ee3ff1d2a9966b39fcc1ec2633c93ca43ea5805581b5117b621537a50efa3a12998658bb6a5dd60682b321d249d52c8e9996bc9ca7eb568f190", 0x9f}, {&(0x7f0000002280)="029096196f4ad9ee03d1c2b859f807d641cd3fd0d64a12e815626cca491cb8858a7658c3a1d4ef32815684464f15fa97ed4f2763b2a3af5ca964bf4982e2d9799d9f649ccb5448af27c4b7ee4efe5ff1812b859ae1f0ea0ca62082b9272c3a3903db305630875551c3fce5e2f93083fcfbc5bc4c5a6e6d24a1", 0x79}, {&(0x7f0000002300)="35c5ae9df7a922fae701bbba8c550eb3be54689c49b9cc1fa3d233e277625dfaf3c213c1d63803ce7b6c413fd8a2a804b6fd4af2b7869e9f72fe4dc795af5cfd92f53a8aefed900752b5a79b2e02c7a266f09d7f218f8c3f254124fdbb23fc158a53e49f59a5ad6ad39792d5d5e0e25dbc0edc3d9e918610d7cd56c27cae90357f8d29126fa577a054bedc6f2935257424ace7b46e03ce5199007d9dbb53044d704505a399f72464a080c5ec86d64ce09d414a111f1666181a639b8139da73095bf8104600ac104680e36abf994520eb884d0467e2fad269742755c1", 0xdc}, {&(0x7f0000002400)="1826db4b6714048568646aca31f2ef80a69ff9355d0ddb09d7e6a151e0e94dc054da70ea8aed6e01377fd0d39f196a3ff9ebab82f054cb5bdbea3c746fb8938f84af3ddc5dae3937bbfdc680312d8eb4d05012c462d93b95fa83480331403d350aa4859b837aa3c26c5acdf58d54fae72926328e3b06", 0x76}, {&(0x7f0000002480)="0f86b04c2b87e998b3b79a0ca4e66950657b469aeeb730de29ecd24508c583ebe21823612e6cc5b46c49a542e5a3465facefad96dda004c2a38bd3be933353d94eab74ffd24f1c7a9506a66cc30522b150b62b16046ff2d06c32a84137633a0ebda5d9e13e9d8d6e34189139b5c140ff7ea51a415e9a439e3c781dae98c895a9b14aade9750137b1adbfc606f7791341b44d165893cbe2d0112eb18d3553d45cb37653df935fb9c9c3587ebfd3659eababd5d3d3366d930f69d407d7d915", 0xbe}, {&(0x7f0000002540)="2f2d7c03d8b4c2dcc525208fb967262f32ec9c336f82dd820e2e5e8933d419abe7d32652b048dcfd8b4cc73e0992c681d99ac62e25202e3b2881964837ef1cdac8f196d460d71cefd4d086e52860e3c0cb403da1393aa8ec1b53e3c570060d22995dbdfc4cb124a13caea87e0b93fe572358fc04d7717cb1b63b5dc88342b85dfab64246399e97b8dd15c2ab233ba58ff547a20199f2836a3286c7fb504547f274b4e73900847d2450d101e7e4ce0da6507bafc120fb497d11552fcb3cd117ccd56896f0efd0c32c658b8c530f68ea688eb9d61e9a755c5e9573", 0xda}, {&(0x7f0000002640)="caac4231ebd2ac9819531516d14b845ab874dd7863dab6e040570a0d6a9ed63a7eb90e47560daeaa77ef077a1a0784e95b519644eec6c224c43c0fe02c071a6222db4e85f4f5c7aa87a9b8ce7642630f9c38837518c615d256e8d632e85aa247e17868d3ba8313ee7afa9e25b26f044a6e6eedad670b01135ac2c871c4255140044b20353af8d031bde9e5c979021dfc2b03d4a2cb8b4cb01c0237659f87e4140617475a55993a3ae215014c3ab6008af09c8652870a3d2d62c4ca46181c28a7e24a2b3f41", 0xc5}, {&(0x7f0000002740)="31a53b043e2aae65a0aac2380fa39e6adeae69f696d9c76bcfb026cab1aa1b86d4679222533bd2119b7e067a6b4536f4b1734eff231ec0a7e9b696dc8d8b263b150a630401373a2b761b636d47ef419e688685be5809aebf68761ab659a178434e746f9c47205f1639fc5e2888b4a8f249b3672529b2cf19930c9b442d64c7fad672fcd6e623812ea3d62964dd88c1aa7a98d76a5cac96386b4fafd755ac25cf9c1a4155f2bcbf41f38c4d3ca6f1f1a7fee4cea6fd8c84d5fe489e1a2a6be3b5d53687ed9254deb967337e0cd16e67530f40f814280335f215d6eba7c91d3c958d1a8d832ddd9177db88f1", 0xeb}], 0xa, &(0x7f0000002900)=[{0x100, 0xff, 0x6, "f0a6ca6478e95b6b144a51989accfd44898ba2166b7de3ac64931ec18fe8039bb472c24320f60bef508f80ea179f14e45b6a27d37fc6b6828c02861ece801cbf15caf878bcbdb27ed48c695064c2cf42fb4c79acdd7f8f2518be803ce9cbfd877f736990175581efc61c8cd656c03fee7ccc0ec696651ac2738ccb86c5cc135c312d05d1c7be78a378b57619f3b27dc23704fc9a551b4cff3d5635076f0bf0e94bdbe50714368920dbfd8fafa9b5e1064fad48c713b20b8c6526a727acf3c8f63efa01d4a34a559b6896065ee9ad8176e027948d8ce1ed90a8f2e516b3f5acb60094b5b872029918effcc80f6f57"}], 0x100, 0x40}, 0x8}, {{&(0x7f0000002a00)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x3, 0x4, 0x1, {0xa, 0x4e24, 0x40, @dev={0xfe, 0x80, [], 0xc}, 0x7f}}}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002a80)="bc0c52c6e5899e8329eb72b282291800f064a204d3588580a6afb2504b00c6fae0e19957b06980eb77244677b9ee50a97a57bdf9847b147963272a35a19fbaf3ecce", 0x42}, {&(0x7f0000002b00)="6d3087abbe2cf3d8784181a197da1eeeda019f24f8af337f3d0cf56d55eb03753d127224acee9bd828e041871448b93909a6461c60663e534f0378288961824d07b264a06ec5c8ff21b52a4edada96446fcc53df2f3a592a5d58f247e41cfd2b889b7c9b09edc3d9bbf1a9e7661aeebcfdd776db5ad6be1a96fac4439288d4326c1bee", 0x83}], 0x2, &(0x7f0000002c00)=[{0x50, 0x12b, 0xe205, "80029c56dc701d23ad3f7c77bdcaa5fcaea23766a045fb5e0055b29ed7a57c52b8a9becca124aa478d113dc7f8169da3ee2e2ce8d74926e04a136730fb"}, {0x10, 0x10d, 0x1}, {0xd8, 0x10c, 0x0, "345c320e2a3331f17d67c57403c75ce336d1fc0d0d767e886d7faf2ed5ea6e5697aaaa447b4f5f9d228214e215e500729f2ec30ea31df8ed6ef6c1b4eef128ef3cf08bcafabf3c68380c546e71259b7957b70659459485a205062ec68fc9f656a8d1f33e441538d90d47a0e06d7d8c5e653b779ddaa6605b108228850c340c20e8d5fb6bfc5b35f1dd055eb49f058718f407f1e63d9b215ec7edc0c2b63fded251201a9f4122377de84d213d72c6e9ed23ac3cf8d533d46bab0828dc0b19d3e0ca5738bf72767b0c"}, {0xa0, 0x118, 0x0, "8fc80e932a1211f502689f6c5b35c5bb42d7bb9eecbab6e59d509922b0e9a85c0d1c7b55ac735628e38ca2ea48ce10f9d81f10b060c4d07a9ea7cfcfe1f2e34b1fcbf7e53df78fb29ca50d48af9ead4884e7665c865eb919737f75e71c507d02da67b6964235e83ca6ab0055c7682a8aa01e27b0a7f15172ef9c70663f3c29b637d06d635170a5e8238479b5e8de89c9"}], 0x1d8, 0x841}, 0x4}], 0x2, 0x48000) get_robust_list(r3, &(0x7f0000000100)=&(0x7f00000000c0), &(0x7f0000000180)=0x18) ptrace$pokeuser(0x6, r3, 0x5, 0x9) shutdown(r0, 0x2000000000000000) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000002e80)) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) [ 1461.069525] kauditd_printk_skb: 41 callbacks suppressed [ 1461.069534] audit: type=1400 audit(1536418865.339:15069): avc: denied { map } for pid=12345 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.120160] audit: type=1400 audit(1536418865.359:15070): avc: denied { map } for pid=12345 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.170127] audit: type=1400 audit(1536418865.359:15071): avc: denied { map } for pid=12345 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.230136] audit: type=1400 audit(1536418865.359:15072): avc: denied { map } for pid=12345 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.285437] audit: type=1400 audit(1536418865.379:15073): avc: denied { map } for pid=12345 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.340095] audit: type=1400 audit(1536418865.379:15074): avc: denied { map } for pid=12345 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.400098] audit: type=1400 audit(1536418865.379:15075): avc: denied { map } for pid=12345 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.426314] audit: type=1400 audit(1536418865.399:15076): avc: denied { map } for pid=12345 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.450727] audit: type=1400 audit(1536418865.399:15077): avc: denied { map } for pid=12345 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1461.475118] audit: type=1400 audit(1536418865.419:15078): avc: denied { map } for pid=12345 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:09 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) sendto$inet(r0, &(0x7f0000d00000), 0x0, 0x20000000, &(0x7f0000fd3000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_buf(r0, 0x0, 0x3d, &(0x7f0000000000)="76e124d5b02690ecb8d3f4d92acad1eb76f8ac043c33b4a57f50044dfa7e48a5aa49489d3d7a974faeaa5943127849e2f5be3bec6016c6835bd0b1c6950adb1f290c9ba68c56f0b8afea8ae397795de9c841735a52f543158d49dc9b96d995c1a56f70ccabd5da3ce97eeea1a61cc98149", 0x71) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) 15:01:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/84, 0xffffff52) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/43) r2 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0xc1, 0x0, &(0x7f0000000180)="1aa346327176417cc70d05cb8d732cb1f102fb4aee379940f1cd956ca70f629dd35512c0f4f0ac23f542c9d20d327b7522d6b8540bcdeaf8f36e8f8058aa14288c158dc61a1e9762fc104dfff5800964974d9e9fb08e57f0f14f7505cd018a451c48c4f856f7b6984a80875f7aecbfa58866610356aae21b9f3968dad04ed9128d1527ade5653ab6a32a9210dd8894b83e0f07cbe319d2b972609d0cb973e9e7d6059a8e2167d0a119cb3fc1a41728b34302f7f6a6f971fef33eca743b8718bbfb"}) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)='/dev/null\x00') 15:01:13 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x800032, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0xfffffffffffffffc) 15:01:13 executing program 5: r0 = socket$inet6(0xa, 0x80f, 0x7) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x2, 0x2, @ipv4={[], [], @remote}, 0x100000000}, 0xffffffffffffffd0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='\x00'}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) sendmsg$nl_xfrm(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@delpolicy={0x7c, 0x14, 0x20, 0x70bd28, 0x25dfdbfd, {{@in=@loopback, @in6=@mcast2, 0x4e21, 0x0, 0x4e22, 0x3, 0x2, 0x80, 0x80, 0xc, r2, r3}, 0x6e6bc0, 0x2}, [@replay_thresh={0x8, 0xb, 0x8000}, @lifetime_val={0x24, 0x9, {0xfffffffffffffffc, 0x9a4, 0x5, 0x204265f4}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x800) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0xf) connect(r1, &(0x7f0000000440)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x80) syz_emit_ethernet(0x437, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000775000)) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000004c0)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000500)) 15:01:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x802, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000240)=""/62) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000280)={@dev, 0x0}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000300)={@empty, @local, @dev={0xfe, 0x80, [], 0xb}, 0x0, 0x8, 0x401, 0x100, 0x1, 0x10000, r2}) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r3 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r3, 0x8007ffc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x6b1, 0xffffffffffffff76, 0xfe, 0x9, 0x0, 0x7ff, 0x2, 0x9, 0x800, 0x800, 0x2, 0x9b, 0x4, 0x3d8, 0x8, 0x80000000, 0x3f, 0x401, 0x50c, 0x81, 0xcb, 0x4748, 0x8, 0x8001, 0x9, 0x3f, 0x9, 0x9, 0x9, 0x3, 0x8, 0xfff, 0x3, 0x400080000, 0x2, 0x6, 0x0, 0x9, 0x7, @perf_config_ext={0x9, 0x100000000}, 0x40, 0x100, 0xd9, 0x6, 0x7fff, 0x4, 0x9}, r4, 0xb, 0xffffffffffffff9c, 0x2) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x4e26, 0x0, @remote, 0x6}, 0x3b) getsockopt$sock_buf(r5, 0x1, 0x1c, &(0x7f0000000340)=""/20, &(0x7f0000000380)=0x14) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000001c0)=""/114) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r3, &(0x7f00000003c0)={0x20000000}) sendfile(r1, r3, 0x0, 0x400008bca) pipe2(&(0x7f00000000c0), 0x84000) 15:01:13 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000005c0)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x5, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000600), &(0x7f0000000640)=0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000680)=0x8) select(0x40, &(0x7f0000000240)={0x0, 0x2, 0x6, 0xb0, 0x5, 0xffffffff00000000, 0x1, 0x80000001}, &(0x7f0000000280)={0x7, 0x8, 0x9, 0x101, 0x0, 0xb53b, 0x7f, 0xff}, &(0x7f00000002c0)={0x79a, 0x2e6d00, 0xb5e, 0x0, 0x400, 0x8, 0x8001}, &(0x7f0000000300)={0x0, 0x7530}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)="63707526352121000000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b81b62cd5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b099a06ef2b72590cf82c59249a74f41af3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f") getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7a3f, 0x47, 0x2, 0x0, 0x0, 0x100000000, 0x1401, 0x2, 0x100000001, 0x9, 0x0, 0x5, 0x9, 0x0, 0x3, 0x4, 0x0, 0x1f, 0x1, 0x800, 0x800, 0xffff, 0x7, 0x81, 0x80000001, 0x0, 0x6, 0x1, 0x1, 0xe93d, 0x8, 0x200, 0x5, 0x0, 0x8001, 0x6, 0x0, 0x9, 0x5, @perf_config_ext={0x60000000000, 0x9}, 0x40, 0x100, 0x1, 0x3, 0x392, 0x5, 0x7}, r2, 0xc, r1, 0x1) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) io_setup(0x10001, &(0x7f0000000540)=0x0) io_destroy(r4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000700)) open(&(0x7f00000000c0)='./file0\x00', 0x2040, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000740)={0x8, 0x8, 0x4, 0x826, 0x7, 0xa3ac}) getpeername$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000480)=0xfffffffffffffe6e) open(&(0x7f00000006c0)='./file0\x00', 0x20004, 0x1) [ 1469.748682] kauditd_printk_skb: 1 callbacks suppressed [ 1469.748705] audit: type=1400 audit(1536418874.019:15080): avc: denied { create } for pid=12357 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1469.829007] audit: type=1400 audit(1536418874.079:15081): avc: denied { write } for pid=12357 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1469.881858] audit: type=1400 audit(1536418874.149:15082): avc: denied { map } for pid=12360 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1469.929990] audit: type=1400 audit(1536418874.159:15083): avc: denied { map } for pid=12360 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1469.976720] audit: type=1400 audit(1536418874.159:15084): avc: denied { map } for pid=12360 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.030117] audit: type=1400 audit(1536418874.159:15085): avc: denied { map } for pid=12360 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.080093] audit: type=1400 audit(1536418874.189:15086): avc: denied { map } for pid=12360 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.120093] audit: type=1400 audit(1536418874.199:15087): avc: denied { map } for pid=12360 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.173280] audit: type=1400 audit(1536418874.199:15088): avc: denied { map } for pid=12360 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.223724] audit: type=1400 audit(1536418874.199:15089): avc: denied { map } for pid=12360 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:15 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x1, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{0x401, 0x4, 0xffffffffffffffff, 0x100000000}, {0x9, 0x2, 0x6, 0xe65f}, {0x5, 0x21c2, 0x4, 0x1}, {0x7fff, 0x43, 0xd80, 0x20}, {0x7fffffff, 0x100000000, 0x0, 0xae}, {0x1f, 0x6, 0x5, 0x300000000}]}) sendmmsg(r0, &(0x7f0000000b40)=[{{&(0x7f0000000840)=@ethernet, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="9b8b21", 0x3}], 0x1, &(0x7f0000000100)=[{0xa8, 0x117, 0x100000002000000, "fb5b42cf0eac6eaa850557132319d96b54f2a966ad112cc95bb9f7fee1c543ffb30385b7e88d006c5c95da1cd5f2afbf67c9d10df5e94489e205160e765901a797c7cf37623a07ce23a69d377c095d2c5b22f3a075808ad032e165f99f01ba6e4ceca4d4cd8346c5961a8978297e4e0a33d6634266d4f77af0951e7d82d0acd5cfba0a3e59643ece0a9b8a62981fcfce5a218a"}, {0xb0, 0x11f, 0x9, "af10c9cb015403ffad4c802be1701c87f1c548f099c40da615c8942974e9b61333b6973f4679288656ba76bd6ee961b78d6028137964fb486aa87c762a5b6c1c1efe45856f3ed6f5e4906f12388c1383e157fe701eead2d8f6e1618d3d47f18dbcae55da1ffed922f3d690d9f81252d8186a7467a8ffb9ebbfc609c3580bb8662e08dc5f00397c37509672740f69b7a15fdee10cf21fc9ed151f"}, {0xf0, 0x6, 0x9be, "ba3881e56a9278d330b435449302ac346d5dbcb7eb259963f85a5d88e342a6add828f457426ab8a01c33447f8fd44e72f8dc31692e18ab7b20269e00c5bcf641febf684a08a32b52cb1903644c2a4dc36e77fb0337d64ff18449f0c863327a12de20109fda90d37af622fdf01d14216eeb2a989af1a6caa0acc96886a144d06d8efde9f550556b6aad9f265281052ab66d3763c9b06b0f45d84dd118f70ae51943471bd18fd5d4b8d6f3fa0e7a2bf3ba8cc0cf2d0ca336d47be71619d1c20915951c8ff13f04193da753e6fe35c5d82834cfbe0705701eec6e1f"}, {0xb0, 0x29, 0x1, "edd1a9411fc25e8d59c7048ad28d298956d9067379648fec38191fc501a3986a0b0314eac1415618596878661aff2040e6fb8c25732e728443f001ac3139c570e0d1c491ee56a1c00b9a0f0b0266cf26d51c856a6ca4a2eb2d0c9040ab07d2f8075cddd71245f23394e90946d84615cddea30a4ac31a9b50669e54f9706a0cae770c9403aa1378e96648ee03adf34319afa094ff20679af6ca73"}, {0x80, 0x19f, 0x7ff, "c6fd2a3a24b7dd7fb6c0d33552f899fbe9803a6a6762125e156c1953fc5e904836e0640a528504c4d97c80f7ba3a0d5058ee14535c6dac5f0a6a8617bcabe5231bb3eed051db0a7e3e7c3f01af8b8a34c574597fa3fb7f24a26d5a453fc4de1664fb04ad3be05cd3de374260"}], 0x378}}], 0x1, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x3, 0x1, 0xff, 0x8, 0x8, 0x3, 0xaaf7}, &(0x7f0000000040)=0x20) 15:01:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000403000)={&(0x7f0000d7efec)={0x14, 0x0, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) 15:01:16 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x1, 0x0) ioctl$TIOCCONS(r0, 0x541d) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) r3 = epoll_create(0xe29f) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000240)={0x14}) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x7, @ipv4={[], [], @multicast1}, 0x8de2}, {0xa, 0x4e22, 0x800, @ipv4={[], [], @loopback}, 0x1000}, 0x8, [0x8, 0x6, 0x9, 0xc5, 0x3, 0x7, 0x8, 0xfffffffffffffa80]}, 0x5c) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) epoll_wait(r0, &(0x7f00000000c0), 0x0, 0x47) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f00000000c0)) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000002c0)=""/151) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r2) 15:01:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) recvmmsg(r0, &(0x7f0000004e00)=[{{&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/221, 0xdd}, {&(0x7f00000004c0)=""/79, 0x4f}], 0x2, &(0x7f0000000580)=""/74, 0x4a, 0x7}, 0xc446}, {{&(0x7f0000000600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1, &(0x7f00000016c0)=""/4096, 0x1000, 0x1}, 0x10000}, {{0x0, 0x0, &(0x7f0000003840)=[{&(0x7f00000026c0)=""/209, 0xd1}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/81, 0x51}], 0x3, &(0x7f0000003880)=""/108, 0x6c, 0x401}, 0x492bf0bd}, {{&(0x7f0000003900)=@nfc_llcp, 0x80, &(0x7f00000039c0)=[{&(0x7f0000003980)=""/42, 0x2a}], 0x1, &(0x7f0000003a00)=""/127, 0x7f, 0x8}, 0x7}, {{&(0x7f0000003a80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003c40)=[{&(0x7f0000003b00)=""/34, 0x22}, {&(0x7f0000003b40)=""/255, 0xff}], 0x2, &(0x7f0000003c80)=""/192, 0xc0}, 0x5}, {{&(0x7f0000003d40)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000003dc0), 0x0, &(0x7f0000003e00)=""/139, 0x8b, 0x64e4}, 0x7}, {{0x0, 0x0, &(0x7f00000041c0)=[{&(0x7f0000003ec0)=""/136, 0x88}, {&(0x7f0000003f80)=""/141, 0x8d}, {&(0x7f0000004040)=""/110, 0x6e}, {&(0x7f00000040c0)=""/179, 0xb3}, {&(0x7f0000004180)=""/54, 0x36}], 0x5, &(0x7f0000004240)=""/210, 0xd2, 0x7}, 0x7}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000004340)=""/184, 0xb8}, {&(0x7f0000004400)=""/77, 0x4d}, {&(0x7f0000004480)=""/104, 0x68}, {&(0x7f0000004500)=""/208, 0xd0}, {&(0x7f0000004600)=""/4, 0x4}, {&(0x7f0000004640)=""/252, 0xfc}, {&(0x7f0000004740)=""/11, 0xb}, {&(0x7f0000004780)=""/15, 0xf}], 0x8, &(0x7f0000004840)=""/65, 0x41, 0xd1}, 0x1}, {{&(0x7f00000048c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000004940)=""/72, 0x48}, {&(0x7f00000049c0)=""/226, 0xe2}, {&(0x7f0000004ac0)=""/162, 0xa2}, {&(0x7f0000004b80)=""/214, 0xd6}, {&(0x7f0000004c80)=""/13, 0xd}], 0x5, &(0x7f0000004d40)=""/166, 0xa6, 0x4}, 0xfffffff800000000}], 0x9, 0x10000, &(0x7f0000005040)) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000005080)={r2, 0x1, 0x6, @random="78e42152aef5"}, 0x10) r3 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0), 0x4) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={"7665740000f3620000000000bd6800", 0x43732e5398416f1a}) 15:01:21 executing program 5: socket$inet6(0xa, 0x2, 0x0) 15:01:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x2) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000100500000000000018040000200200001804000018040000280500002805000028050000280500002805000005000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ff010000000000000000000000000001ff0200000000000000000000000000010000000000000000000000000000000000000000ff000000000000000000000076657468305f746f5f7465616d000000726f736530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004d41535155455241444500000000000000000000000000000000000000000000000000000000000000000000000000000001fe8000000000000000000000000000bb0000000000000000000000000000ffff00000000fe8000000000000000000000000000000000000000000000ffffff00000000000000000000000000000000000000000069705f767469300000000000000000007465616d30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800534e4154000000000000000000000000000000000000000000000000000100000000ff0100000000000000000000000000010000000000000000000000000000000000000000ff02000000000000000000000000000100000000000000000000000000000001000000000000000000e00000000000000000000000000000ff000000000000006c6f00000000000000000000000000007465616d30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000000000007f000001000000000000000000000000ff0100000000000000000000000000010080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x570) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x839b, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioprio_get$uid(0x3, 0x0) 15:01:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0xfffffffffffffe13) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) 15:01:22 executing program 5: writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f64009400050028925aa8000000000000008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 1478.730593] kauditd_printk_skb: 28 callbacks suppressed [ 1478.730603] audit: type=1400 audit(1536418883.009:15118): avc: denied { map } for pid=12384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1478.810132] audit: type=1400 audit(1536418883.039:15119): avc: denied { map } for pid=12384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1478.866919] audit: type=1400 audit(1536418883.039:15120): avc: denied { map } for pid=12384 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:23 executing program 5: socketpair(0x2, 0x6, 0x9d, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000040)={'veth1_to_bridge\x00', 0xfffffffffffffffc}) getdents64(r1, &(0x7f0000000080)=""/79, 0x4f) getdents64(r1, &(0x7f0000000100)=""/134, 0x86) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x12}, 0xfb1, 0x1, 0x0, 0x1, 0xffffffffffffffff, 0xde3, 0x4}, 0x20) write$binfmt_aout(r1, &(0x7f0000000200)={{0x10b, 0x0, 0x8, 0x2ad, 0x1ff, 0x8, 0x2f1, 0x3}, "6a2333ca0a4c9b8ba66dbf83cfdf3ab43bb7730c6035992fc0709b5d8308166d783e493ad01f7bce4a592893847204b6bca9e55634486bbb76503243a39a98e5e6d2f697d9ee1bd0c236238235f42146269490f5b5d719226de9620fda53cbf43c68e87c9abcb7b7aabf2d78ead24863e73624", [[], [], [], []]}, 0x493) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000006c0)=r1, 0x4) io_setup(0x2000000000000, &(0x7f0000000700)=0x0) io_cancel(r3, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x14, r0, &(0x7f0000000740)="7189f7050809421413f563ad5cd1e7f738696661006e135bd5ead5f735f47e6f0daab9ac5c85452fc096eeb2f97a4419e0fb1ea0c31f1d48b8122159839a146a6e79a1e7cf984bd4a0a2e0752d99f278bf5663bb6340508ffa887dd5aaaa6f55d7c7d2c43eeaebffde2fdf1a43710f076e671744fc49deb0edd1042c8b5af4470cc638a4ea2045728ad4d0952acd2af81d8e9c01c4e8c72cb4e9ba830c0334ba61dbb48e9bb477cbe73258153641b1b7fa50929820974d417a", 0xb9, 0x4, 0x0, 0x0, r0}, &(0x7f0000000840)) r4 = epoll_create1(0x80000) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x7) init_module(&(0x7f0000000880)='veth1_to_bridge\x00', 0x10, &(0x7f00000008c0)='veth1_to_bridge\x00') r5 = add_key$user(&(0x7f0000000900)='user\x00', &(0x7f0000000940)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000980)="25455b946f", 0x5, 0xfffffffffffffff9) keyctl$assume_authority(0x10, r5) syz_open_dev$binder(&(0x7f00000009c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000a00)=""/145) io_setup(0x51, &(0x7f0000000ac0)) recvmmsg(r0, &(0x7f0000001a40)=[{{&(0x7f0000001400)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001480)=""/71, 0x47}, {&(0x7f0000001500)=""/208, 0xd0}, {&(0x7f0000001600)=""/11, 0xb}], 0x3, &(0x7f0000001680)=""/218, 0xda, 0x101}, 0x80}, {{&(0x7f0000001780)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001900)=[{&(0x7f0000001800)=""/198, 0xc6}], 0x1, 0x0, 0x0, 0x1}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001940)=""/19, 0x13}], 0x1, &(0x7f00000019c0)=""/113, 0x71, 0xc39}, 0x9}], 0x3, 0x40002022, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000001b00)={r6, 0x1, 0x6, @broadcast}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000001b40), &(0x7f0000001b80)=0x40) ioctl$int_in(r2, 0x5421, &(0x7f0000001bc0)=0x1000) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000001c00)) r7 = gettid() getpgid(r7) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000001c40)='hybla\x00', 0x6) ioctl$TCSETA(r1, 0x5406, &(0x7f0000001c80)={0x9, 0x6740, 0x9, 0x4d, 0x0, 0x100, 0xffffffffffff2d71, 0xffffffffffffff7f, 0x13183f29, 0xffffffffffffffe1}) r8 = inotify_add_watch(r1, &(0x7f0000001cc0)='./file0\x00', 0x60) inotify_rm_watch(r1, r8) r9 = dup2(r1, r4) accept$inet6(r9, &(0x7f0000001d00)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000001d40)=0x1c) [ 1478.919538] audit: type=1400 audit(1536418883.039:15121): avc: denied { map } for pid=12384 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.020105] audit: type=1400 audit(1536418883.059:15122): avc: denied { map } for pid=12384 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.095058] audit: type=1400 audit(1536418883.059:15123): avc: denied { map } for pid=12384 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.180116] audit: type=1400 audit(1536418883.059:15124): avc: denied { map } for pid=12384 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.240085] audit: type=1400 audit(1536418883.079:15125): avc: denied { map } for pid=12384 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.290099] audit: type=1400 audit(1536418883.079:15126): avc: denied { map } for pid=12384 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.340097] audit: type=1400 audit(1536418883.089:15127): avc: denied { map } for pid=12384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:27 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000240), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[]}}, 0x0) socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086610, &(0x7f0000000040)={0x7ff00}) [ 1489.095537] kauditd_printk_skb: 48 callbacks suppressed [ 1489.095546] audit: type=1400 audit(1536418893.369:15176): avc: denied { map } for pid=12398 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.170143] audit: type=1400 audit(1536418893.369:15177): avc: denied { map } for pid=12398 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.240131] audit: type=1400 audit(1536418893.389:15178): avc: denied { map } for pid=12398 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.290127] audit: type=1400 audit(1536418893.409:15179): avc: denied { map } for pid=12398 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.340120] audit: type=1400 audit(1536418893.409:15180): avc: denied { map } for pid=12398 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.420144] audit: type=1400 audit(1536418893.419:15181): avc: denied { map } for pid=12398 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.490109] audit: type=1400 audit(1536418893.419:15182): avc: denied { map } for pid=12398 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.540094] audit: type=1400 audit(1536418893.439:15183): avc: denied { map } for pid=12398 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.590093] audit: type=1400 audit(1536418893.439:15184): avc: denied { map } for pid=12398 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1489.640114] audit: type=1400 audit(1536418893.439:15185): avc: denied { map } for pid=12398 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:37 executing program 6: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) r0 = socket$nl_route(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000002c0)=""/164) r2 = dup2(r0, r1) write$P9_RSTATFS(r2, &(0x7f0000000180)={0x43, 0x9, 0x2, {0x6, 0x8, 0x0, 0x4, 0x8, 0x0, 0x9d, 0x7, 0x5}}, 0x43) vmsplice(0xffffffffffffffff, &(0x7f0000000980), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0x22d, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="f54152a933aa2f3c0800823e11d740b7b605d700", @ANYRES32=0x0, @ANYBLOB="030000000000ba0008001b0000000000c6e800b5c6fe9e6bf439b0a13a69ac4bcabf63908c0242d17c5d95877032f728f19d7225f55dc4cffed9a5a0e6ed807ec04ca0fe5e5186a3562d023cd6c1ffab9ce19871fd8bf6f835e8ef146c3113e68db12e854d171c082698512a1359dbb5e7b814d2fd91453187a2e2dda03c6233c9d9f2c6436e0d25c205c2f36930b37a9d07cdc20000000000000000000000000000000000000000000000000000"], 0x48}}, 0x0) 15:01:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff23) r2 = socket(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000002c0)="9faaa22b8c0151d7aabae4ba404699ce85f73e837b7c5c77515be5411230e54ddea63750231452751b0a42f52903baa29aa26e2a02125671402afb2c711638ad65476b827cdde7f7c3556106d0c16e7ba20b2d5b4b15959f05ac911f18a865033eb69368813ba34c831267f3dfb2fdb1cb841eeea4ef8e990ef6ed20de3cb8e6be801c4bdd95794ecbfe3b26dffec189e4348cd3868da10861401b23fc0ca827f78969b3162060be7570bb3245b425339f0f37df0dc21795701654f9541c25fcaba20d2278f5a2545155c9d8fdef0c6520e8f35a67441a3573bc4f1be781bb8a4819b09d26bf7b3b9b682f0b03c5e6156ed29b98c3015bfcfb2fdf10debd1282e6fb18c595b7e6378d6a32fbbe306b52455d52550b730a59506784101eb40cfcf869e00ca5bedd54fc5849046e251e24f24f4417e3aa14fcc294c8d2980331266bfc378d1870157afe724f7e99d4026b85a9a114bf1d47f023844515067eaf1778abb108420d3e3e19556247d2204b0789bbc4446e2de8066b4f9f867d890a86cd537256b50e7098c68badfe7ce8a711637aabc36d4c3377e1b7f30482378542ab1af49c44e137b829f5e5b0dc2ea56a2dc7485b031e2cb0fc1c0efe2274b575d2710bd3dc63269ed51c204c97e8d78b09ddf4d54309b2edd22f0206016b99172001743a5ce6ac1cb5d5de83d44594548868dd3082d547be3dd484ebecdaa70da5b33855f900bea0c2be50403fe29338b0beda8512ea9a9c6df6a6d482ad9d89968cf928e8059e8570d191b652c8241b3ed23a9adef28b9842c86cfc5b3f232ca80a4bb6c80c5ae1d1082914ff3ca247596012b66889ea1bd245074fb794d2a11628d42d1610f4f2aa083e855c9f4c350fb62f2d859e859099fe967577b76e2aadc10be858c1a30411ad45c989382ba4293b7d74680b7fb0c2c1b81e15b5960c58cefc27a15443f6cd42bdc3c5f0b2274ed87540b1da803d64ba14fe594231e321c12fc996a66ab0c36310edb01f2581f9f060afc36afd3595c33cfe894fce950b2629d16bbc587dec0e55e104c3f57d4badd5fac8fdee0e5cd1f8da8f7c6c8bdef21cf351e294bc2ef906caa0120e461ddc92461711962fb617b8a55c64de3edbbde1537ab53eecf236cfa4c48f12bd7289e7616d023b1241bfec79380e526c35ee706059592e270071d46fc2425592fe43a30eb724095610b01808d211be89427125a86d4fc078860440c58023e718ff687edfa1216a44592e185d39689b449eefc2d4eb63f381e9e203049b96db607af1d9ef926dbd6698d980deccba5e96a161c996e47e857e23114052f217211cb5f9e3bb44e944677a1257c44275082ad300e1b84ef0189a92c701e71fa449bb9ee5059ef67fadd60063ea8d77baa6f3d46b4615bd3402c4c143c1b9e730613210b7e9971d9e343935df12d8198a06a0983f4a19dbffb617034182d50835e79a53264d1f127e9390d93df7283e5687e0b828b06eaa3eaf6c4bd6634f8d33f0e81ccf93245d2ca2101bf43dd0105da633bfe6c443471a1ef1e71f43c0becc62dbd5131ef235a0186bfb855dc0496950fb4537999d0e76c5cb1561f057ea654a6f471df6379208eb2e6f2dd9c3731dac7da5f89166e440a6db16ebe56a255d84d917d889a1c777fb354a55df5f44bec2846bc5a7a2fbed4e8e6ec2ee7f1b6e02b7f6b417321fcf9957c32a61f7e7c5b837448a27f9cc39dcef6fb997b3638eaa18e0022d6756d381b298293c799e8dcff67caacd5e5f9a83bf84452c74c6a25fd02e52e0af213de5c5857961d66e7e3cba010cde8bec6195017cf2a3d8c9cbb154790e80fbf45c3c1ad21840db183a18085c82efe4c67d2e56f3e92ba74864d781d118d874d9a774452f88d5ed9f5cc9fb0e45a1fee0b6aa8e1e70d6419405dbf1e195e18c4135297bc3e0fad33d2b5840cef10770d5c95c4764014ffdd358b06dd7d87db0aea5a57be3ce074cbcc9a4262d287171ecd1f4de643ed19d5286db1f078d59ff682052e79a03651e7978cab9c78838e2faf59efca71ec4a2a19a51c1c80ed45fc604435f3f87cac091d9f844291c5c8581e047205c04f0e11acedeb7a0c369c81a377e361d8716d01cffd34807a3d718ca49546a959b2dd70f7aed49e8559960cc1c001c980424f82e24380131f8e8c42da6bc08d6c6cb54ed8f9af2b4e4c8237431c81013d4b7e64ed1f584555bc6ceeb0cf6cfe1d3ff5f8061f5b7ee6220e66474532eb9dd77a261ee57acec182e96a8dc6b3588f041bc1d018fd9b3f8ddbf9d14efdf6e3149efcb9aa674312bafbd8cf74d2dbc46b5020824c6ac671b1119ef685936845b2a8e545a386996884728ef5e11f152461d9480adb1c0f6c04dce9d8fe20fd2a10fe1fbf8b99a06ccd1a11a87113907dec423ebdc549fcde67b6e821361998205df0e0cf19597f861ace3d58bd059c12fdfb426dc4940621f53ef8d6d0eb74e35c864ffc74c83b032294e08c012942103f23c2ea0d9eb2190459f8fc67f9fc075fa7296d2fe590f8ff7954d1bab6ede86843f6731dc2fb5492a0893c7fe803338beb21aa6c7df7cdbdd955d512037c9ab881b74f8ead68782c31ca16cbf8ff81e4d9eec50587161bcc08080e733d874e5513d44c1bf85ffccc74fd48da1f1afeac7af3a5abb90e69283c92132166cd1120a12ba7def2082b127a319c9121f45fd22ce3c202c222e5700d8961dbf4d1faf0372f22bdb0a826efc20cf63a340792834bdf14aa8bf0697bf2d84471d0180a9e3a4e7d6ea9b2fe85912d74302d41901b1014f441d2291d4575038df5ac69bd103b266bc5f6c6f76125a887b07b327c87c9b7dca037669d39040c0814b73f620d21aeadae754110a31926e5ba8ad9786226bb5f85aa173597340942ec226bd85179c0ce793c668e3efbe99917aeaf6a94716196075054b12ceabe9dbe85a852419d981f85e68a2e6a4f8ccdb873ebfe07ca41a4841f17a5e9b8d66f6d7542b26f55d18da9940c7fb1c8d9d8104ccdc99de80627dc2f07de891f5f6909678b77b3eb43fd54c6f74aeb5f8fae942294089f859e4b001447c488012af1098f4f3455ca22f32d81b844f3d644dea4c782b9752656149d8c822b005a4fd3a982b31bbe451be81245cb7e3575d4274268c33c998af3e8d4a1bc7dea5e60a2470bf1bcf04b92515f0843ea3ed46b99115de21c65f570d9f26f5f4b79e01b8996d5afa455dfd482f8af937b6a12ecfa2901e140602cd13a474ed21e2ac4c1a8094b08b5baa0d4709982788eec8f653f6c8442c9d93238da17e8b2814c7c5496aea3b1ad55e6df262a0d7249f015c19f89236904d8818a0ce7c0e9acc34acb9de6fa841b11daa45f4346282bffd2b54e69597c926988c2f1733a9d0bf9069a848f0e25361d846b13ead773aa8f124bcf410cab0752e585a06b4c94b524412491a210cd5c8a46d52ce8688c73f65227f6f9f901240e348f288a43ad745d0be4c80c2c15e7dd5972620cfd795e9ffd9329e2c4716f86b1fab7a110aee3aac789058e0f89f3edc532c2eaecdcdee82bfaf1c44b6bc3d9d41da52381fdb3e7c846478df358e24385282e8a9a864f1d86d645cdae6822e034e47f1ee9091f7e32676eda410c8f8aae9a4fd3fa4d57bf5838f1c55aeb13c5dfa51652c29fbdf3f00d6adbc64162f50fae0ec0eee023a6e4f40511d12039670dc37f5d909abb5dfc2dd646b8956636773f388238d18cc5ea308618b072f641cd2a2a095a8bcf6ff9259170d531ce1c2a473c2de9b8dbf7e2afb2233e68c9a77f1a62743f98a0953da00a54f95eeca4faf51b86e57afef4b10eed058e0ed516dbfb693c000e762cdcc1957c3cab6079efc228cc86b35f3d26d40504d9f5a3cfd3714e8114dbf26def669c917e4c254adaaf4f8ea86b9a333a662d38220819797c0032e722a164d0132cf471038fb19dfcd73b26ebd6e19a3c96fb0f10acde1899a9c5bb1cc586995d5a8fd880ca26680c1cf6b4da573e854269a9d79d7da60a7e877ef1806837b61ffa800dc707eb6f5831041e96acde926f892ec8cde2a76865d9a06e203a5a03c27e9adab18576094b90bc2ef10bf4ce4ae656e83808f58317b176775446fc41878239c111663da7164dc3ac81e9784ec5288225c39f1b0054f46f24e06b05484c894e65e4dbbea08695446ff68988c656cd392dbe0e277e3ef7ecdc70923e49c04ee5e799a910afcb2b3eaf642c0e58d21b2afef8df04f93cd135636992bc65d7ab53033a0003283af75c2604bf5b04b9beb7993c75af0ad07b1a9c235d8fdb67cc083df57e92605e98f8ab739697b6f80a16fd82379df61d25517ec45023fd8f04931724f87a278b0bb6b3346b55842c874d5459e050d852b3ce1763ce02061e47e7a951915b6b4d31725bde5f5053a101cedb799ad1cf7d0d64860c5a9496d8a7171211b0362c8084643ae46f47d0ea183c4942d475aafdbabf9528008a3725a9c097f4b783942d578570c4bc06448a895794bc353c0d4c3ca0864c4fdd685c3004586726841aae53c55e051411fa4c419b2f862e42cc6405f2d4faa1e784e43d13e1c32434aebd678a25bdfd58287a4667965a8feaedd9f534992b338bf78e738bf020c6fb2f40790f1f2c358a9f0589de916c03b782429d7b8bbeb54498b4b403a0f8292a9a0fec020007125240da54d1963cda956e5bb7d4f8a9e9c364788d865398f2a17db845f1e832138d5ac184196d1cc8c85d98c99ccb9f26d944eab918bb908f2b2b77a2426672fe014c6c3b7009b17b0ac76b801894fd333f6370a582c25b3b28dea6a824406cfde4d12dd3b627ceefc8dfd6464f70f07b08a52b79f0bd03694c71c7f47f99fc6695dc90df716e159ac1f22b9c5915e8fc62164f0a971e9ca794943e504b37231ad23cf17af8d23b0e9ee9f45ec1f5986f17e468d72c5ca50c278e6d2024e3d0ef70227b4b254bfab8b74c5033eede7cba4eefbab417890c8837013bada1b6729382512010994f9f4bc74023afadff8a218dc72853efb36d2aa43e2786fd6215377bab65ede1c1bf2fa76991fcc872a2455c228fc03c6b3f5d8a50998a574924b842a58fa37c7f32adebee5efdb95b7aee7965062497537d2ff0f354f4efa18afa3b8303a25245313f9a0b96923e65c402d979187469758853db6960642b9c3b94ea376d87931509e92146040826e89090eb73d5b0eadb20491743db8d0973ec560f253c68ce4a9d5431af35960bd3580e6ca4147888d2ff60f60f339df82765395013280de600b96e67119192e65791c7a1bae4089d1a92613b2f7e5899a654e03001fc95107f212ab725392cb55cf46b26a5dc3bd31a037e5cd4a3d5b4a39a72fed9690248d3ce3895833ddc23edf6500bde813468f076136675a3f90da303ac1bca18b37375d1afe718341a5bf813fccc5fe879dfa4e5e3ce54c11c12767ffa6dd678f76686fb2a4b5455de23827ca0afc1290ba3ad362ddd2c675e1cd591058d8eeed4b6035724a24380c080ae56cf82f04717434a7e5bc9a9f7a8a245882643a3cdea0aa6401dc23711355cd5760f0962b4f3eb3c07ab56e98bf5e0590c2debbcf7ef2e07a3f896a01d685898aab5aaf9ee45245ed9c88fb94177fc7ec1594ad8df94824a5e0a38619f5c32e55aa49cc0b8bad0313bd24d0dc9b5d343558698cf8e9a305bfa5b310165bdc98a215d856b8bed5223d87d9c7f19a8c6b1b38a37b7754d99e8b4c5708870fceb9da00c894de3f020e57b62ccc3d389135708d89cfd497a06940f050d5ac465ee96022", 0x1000, 0x880, &(0x7f0000000180)={0xa, 0x4e20, 0xff, @local}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0xd, &(0x7f0000000100)={0x0, @empty, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x3) 15:01:44 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x9, &(0x7f0000000040)=""/178, 0xb2) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="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", 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000340)={0x5bea}, 0x4) sched_setscheduler(r2, 0x5, &(0x7f0000000140)) getrandom(&(0x7f00000003c0)=""/255, 0xff, 0x2) fcntl$lock(r1, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, r2}) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x1) 15:01:44 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 15:01:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x800, 0x5, 0x1, 0x8}, 0x10) r1 = dup2(r0, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) setsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000080), 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000100), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@loopback}, {@in6=@loopback, 0x0, 0x3c}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 15:01:45 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x24100, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/36) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x10, 0x20) r2 = perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) getresuid(&(0x7f0000001380)=0x0, &(0x7f00000013c0), &(0x7f0000001400)) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001480)={r3, r4, r5}, 0xc) linkat(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x1000) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r7 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r7, 0x29, 0x11, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getdents64(r6, &(0x7f00000002c0)=""/4096, 0x1000) getresuid(&(0x7f00000012c0)=0x0, &(0x7f0000001300), &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f00000015c0)=0xe8) setreuid(r9, r10) fcntl$setlease(r1, 0x400, 0x1) 15:01:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000540)="9fc47f580258db2448bd6b8a5bdb9ea3c73c1b4fbf702a8ad40ba130070dad75cab5ad8e7d08f1f2dbe7b33938654e15191dab86f691e2772fa46ede1728eed0876fc7cf9a3155b3eb2c7ac70bf3c7636d", 0x51) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffbffffc) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140)="9c002e4426fae11134ced4b5d296f96bc2f5ceba26519d2e9503b46937e8b0e0f4f210a704c9d8f034a1a57361d0b99d9c", &(0x7f0000000200)="52a289b863f4ddc2a8228d78e4a1feb5a942e168b377d9d83bb7c7b7"}}, &(0x7f0000000280)) accept$unix(0xffffffffffffff9c, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e) syz_open_procfs(0x0, &(0x7f0000007000)='net/sockstat6\x00') getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000380)=0x8) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000400)={0x8, 0x10, 0x1}) 15:01:45 executing program 1: capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x102d}, 0x48) r1 = socket(0x7, 0x8000e, 0x3) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) r5 = getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000340)=0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000140)="126ee4af22dfe322648878d302c178935b6d12826c5ebccd4810d6ee358492773d64a76550616bec2301cf97b0ffec9e8d17b018f6e2a2180c0cf35da27b2f1cf5139f83c634d0e70b6e7ae5f150bd72ebe02cf994e65f2cec75b41e0390b66cb732de9c0ae869c7c8856718", 0x6c}], 0x1, &(0x7f0000000440)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x28, 0x1, 0x1, [r2, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x18, 0x1, 0x1, [r0]}], 0x98, 0x8000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000ad00020000009f47dfd14042bdd0000000000000000010000000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000540)=""/195}, 0x48) [ 1501.871206] kauditd_printk_skb: 1 callbacks suppressed [ 1501.871215] audit: type=1400 audit(1536418906.149:15187): avc: denied { map } for pid=12418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.001401] audit: type=1400 audit(1536418906.179:15188): avc: denied { map } for pid=12418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.047320] audit: type=1400 audit(1536418906.179:15189): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.190099] audit: type=1400 audit(1536418906.179:15190): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.250959] audit: type=1400 audit(1536418906.199:15191): avc: denied { map } for pid=12418 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.281080] audit: type=1400 audit(1536418906.199:15192): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.306984] audit: type=1400 audit(1536418906.199:15193): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.340174] audit: type=1400 audit(1536418906.219:15194): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.370573] audit: type=1400 audit(1536418906.219:15195): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x100, 0x0) splice(r1, &(0x7f00000000c0), r0, &(0x7f0000000340), 0xa76, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31eea55449d0d5698c32f9f312010d139687762242941885ed193cd79ccee5cd99ed0ac866e501b448ad448c373fa554a03ca7e6bb1787e818db8a4891631631de9f039a5d005516b477582e1d18f32ab3794ebeba50d09d382e648ae9c309a559e63c4165b8fedc071aac2534d491a0a9e3963a8c5cae87e8a44dc0a585bdfda1a6d184115e09e63d430fa6e807965509511af1c9e7f21a5e02082b1d44a37ff881a1cc205258c2eb0202e4c300e209959aad4b426692450d6f01fb14bca00da43e2745e66b9e0a51eba837105d69499053a247ba35e1c4376422d6d29b1b43143293e6565e6c55e904d57ff6a286e229770fdb5f2980e39fb637e27c948ca71d4043d6384f22f98532ad3543eaba4b569432631cd83043ab2c15896f31209d9b8514312d8e569564479c31513a6e420acf682a2225362bdddcee6387a9667b9368b3ee8aab1cada8150644f2ec439d50afb223d89cd84b9eea93bb7100103e41ae260d50461f6878289cfd9e000000"], 0x29) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000080)={0x16, 0x9f, &(0x7f0000000140)="d363ba78a120b36328ef4463b9a397ce83da10bada96a7bd58caedfa8581037bf697ccfb5af390d66dc9ec942e2d0ffdb03818b6d7c534bb8df91787888e2667cee43832f170d1adeb1c653aa5777f86fca7cc3977a2a698ec672e1695c0ff2635ddaa1d9bd5138884b6c1656f3465238674a290135423b4da0829fb620bbbe7b20ea340d5b8fdfecd7b6b9c7ec16518b02013d7ae7405eaab08532a3a30ae"}) sched_getattr(r4, &(0x7f0000000100), 0x30, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x1c) [ 1502.435204] audit: type=1400 audit(1536418906.239:15196): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:01:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r2) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000400)={0x0, 0x0, 0x2, 0x0, [], [{0x2, 0xa8d, 0x1, 0x4, 0x1000, 0x9}, {0x7fffffff, 0x10001, 0x6, 0xd938, 0xa5a, 0x7fffffff}], [[], []]}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r1, 0x406, r1) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000100)={0x7, 0x4, 0x1, 0x3ff}, 0x10) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000003c0)=[0xfffffffffffffffb, 0x2]) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000180)=""/215) 15:01:47 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x7fff, 0x5, 0x4, 0x8001, 0x0, 0x7fff, 0x10, 0x8, 0x101, 0x4, 0xffffffffffffffe1, 0x2, 0x1, 0x5, 0x2, 0xfffffffffffffffd, 0x1, 0xffffffffffffffe1, 0x9, 0x5, 0x99, 0x80000000, 0x8ef, 0x2, 0x2, 0x400, 0x101, 0x7ff, 0x5, 0x80000000, 0x851, 0x4, 0x86, 0x80000000, 0x1, 0x9, 0x0, 0x1, 0x1, @perf_config_ext={0xffffffffffffffe1, 0xf3c}, 0x24000, 0x3f, 0x0, 0x2, 0xfff, 0xffffffffffffff01, 0x81}, 0xffffffffffffff9c, 0x3, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) rmdir(&(0x7f0000000080)='./file0\x00') [ 1503.838387] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 15:01:49 executing program 3: r0 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r1) keyctl$describe(0x6, r1, &(0x7f0000000200)=""/230, 0xe6) keyctl$link(0x8, r1, r0) 15:01:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) memfd_create(&(0x7f0000000000)='##\x00', 0x2) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000240)=""/174) 15:01:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x948) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000984ff4)) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000200)={0x20000006}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000180)={r5, @multicast1, @multicast1}, 0xc) 15:01:49 executing program 5: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0xe9977e70a994c01d) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getattr(r1, &(0x7f0000000080), 0x30, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='status\x00') r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f00000000c0)={0x2000}) write$evdev(r2, &(0x7f00000003c0)=[{{0x77359400}}], 0x18) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000140)={'lo\x00', 0x1f}) 15:01:50 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) fallocate(r0, 0x2, 0x7, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) [ 1506.330659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=521 sclass=netlink_route_socket pig=12440 comm=syz-executor6 [ 1506.763077] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43571 sclass=netlink_route_socket pig=12444 comm=syz-executor6 [ 1513.269426] kauditd_printk_skb: 27 callbacks suppressed [ 1513.269434] audit: type=1400 audit(1536418917.539:15224): avc: denied { map } for pid=12465 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.281664] audit: type=1400 audit(1536418917.559:15225): avc: denied { map } for pid=12465 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.284968] audit: type=1400 audit(1536418917.559:15226): avc: denied { map } for pid=12465 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.286617] audit: type=1400 audit(1536418917.559:15227): avc: denied { map } for pid=12465 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.306152] audit: type=1400 audit(1536418917.579:15228): avc: denied { map } for pid=12465 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.310838] audit: type=1400 audit(1536418917.589:15229): avc: denied { map } for pid=12465 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.312445] audit: type=1400 audit(1536418917.589:15230): avc: denied { map } for pid=12465 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.325674] audit: type=1400 audit(1536418917.599:15231): avc: denied { map } for pid=12465 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.341664] audit: type=1400 audit(1536418917.619:15232): avc: denied { map } for pid=12465 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.349043] audit: type=1400 audit(1536418917.619:15233): avc: denied { map } for pid=12465 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.839625] kauditd_printk_skb: 12 callbacks suppressed [ 1521.839635] audit: type=1400 audit(1536418926.109:15246): avc: denied { map } for pid=12467 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.861708] audit: type=1400 audit(1536418926.139:15247): avc: denied { map } for pid=12467 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.865171] audit: type=1400 audit(1536418926.139:15248): avc: denied { map } for pid=12467 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.866838] audit: type=1400 audit(1536418926.139:15249): avc: denied { map } for pid=12467 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.872981] audit: type=1400 audit(1536418926.149:15250): avc: denied { map } for pid=12467 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.884727] audit: type=1400 audit(1536418926.159:15251): avc: denied { map } for pid=12467 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.901670] audit: type=1400 audit(1536418926.179:15252): avc: denied { map } for pid=12467 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.907485] audit: type=1400 audit(1536418926.179:15253): avc: denied { map } for pid=12467 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.909059] audit: type=1400 audit(1536418926.179:15254): avc: denied { map } for pid=12467 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1521.916428] audit: type=1400 audit(1536418926.189:15255): avc: denied { map } for pid=12467 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.649461] kauditd_printk_skb: 1 callbacks suppressed [ 1537.649470] audit: type=1400 audit(1536418941.919:15257): avc: denied { map } for pid=12471 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.661686] audit: type=1400 audit(1536418941.939:15258): avc: denied { map } for pid=12471 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.665056] audit: type=1400 audit(1536418941.939:15259): avc: denied { map } for pid=12471 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.671747] audit: type=1400 audit(1536418941.949:15260): avc: denied { map } for pid=12471 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.677929] audit: type=1400 audit(1536418941.949:15261): avc: denied { map } for pid=12471 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.694769] audit: type=1400 audit(1536418941.969:15262): avc: denied { map } for pid=12471 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.696361] audit: type=1400 audit(1536418941.969:15263): avc: denied { map } for pid=12471 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.702065] audit: type=1400 audit(1536418941.979:15264): avc: denied { map } for pid=12471 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.711670] audit: type=1400 audit(1536418941.989:15265): avc: denied { map } for pid=12471 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1537.719019] audit: type=1400 audit(1536418941.989:15266): avc: denied { map } for pid=12471 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.154778] kauditd_printk_skb: 1 callbacks suppressed [ 1767.154788] audit: type=1400 audit(1536419171.429:15268): avc: denied { map } for pid=12476 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.280817] audit: type=1400 audit(1536419171.439:15269): avc: denied { map } for pid=12475 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.400864] audit: type=1400 audit(1536419171.449:15270): avc: denied { map } for pid=12478 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.510158] audit: type=1400 audit(1536419171.449:15271): avc: denied { map } for pid=12478 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.543116] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1767.543123] audit: audit_lost=53 audit_rate_limit=0 audit_backlog_limit=64 [ 1767.543128] audit: backlog limit exceeded [ 1767.544531] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1767.544536] audit: audit_lost=54 audit_rate_limit=0 audit_backlog_limit=64 [ 1767.544539] audit: backlog limit exceeded [ 1778.066568] kauditd_printk_skb: 209 callbacks suppressed [ 1778.066576] audit: type=1400 audit(1536419182.339:15337): avc: denied { map } for pid=12481 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1778.180573] audit: type=1400 audit(1536419182.389:15338): avc: denied { map } for pid=12483 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1778.270144] audit: type=1400 audit(1536419182.389:15339): avc: denied { map } for pid=12483 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1778.380099] audit: type=1400 audit(1536419182.399:15340): avc: denied { map } for pid=12482 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1778.476260] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1778.476269] audit: audit_lost=103 audit_rate_limit=0 audit_backlog_limit=64 [ 1778.476274] audit: backlog limit exceeded [ 1778.478443] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1778.478450] audit: audit_lost=104 audit_rate_limit=0 audit_backlog_limit=64 [ 1778.478455] audit: backlog limit exceeded 15:06:25 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f0000000000), 0xc, &(0x7f0000001280)={&(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000001800120008000100736974000c00020008000400681d0c2a35a417dfe968db66c299e58a1f597e20c003d5618130d59662ad41caf7f09ef37e2b54a260a25dc05d7835de9dca73f2107a37e276", @ANYRES32=0x0], 0x2}}, 0x0) 15:06:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={"6c6f00ecff00000000000000f9ff00", 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) rt_tgsigqueueinfo(r2, r3, 0xe, &(0x7f0000000180)={0x20, 0x9, 0x800, 0x4}) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000002b80)={&(0x7f0000000500)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFNAME={0x14, 0x3, 'ip6_vti0\x00'}]}, 0x34}}, 0x0) 15:06:25 executing program 5: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) timerfd_create(0x3, 0x80800) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000280)={0x1, 0x7, 0x200, 0x200, 0x488b, 0xd9c, 0xfffffffffffffff7, 0x4, 0x5, 0x6}) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 15:06:25 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000001c0)='./file2\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000000)='./file2\x00', 0x5, 0x200) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/91, 0x5b) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x0) 15:06:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000300)={{0x0, @loopback, 0x0, 0x4, 'ovf\x00', 0x7, 0x0, 0x5e}, {@multicast1, 0x0, 0x0, 0xfff}}, 0x44) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getpgrp(0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000480)={[], 0x0, 0x2, 0x0, 0x5, 0x4}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x5) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) getsockname(0xffffffffffffffff, &(0x7f0000000600)=@nfc, &(0x7f0000000680)=0x80) write$binfmt_elf64(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x31a) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/mls\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f00000005c0)='./bus\x00', 0x0, r3, 0xffe) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) statx(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000380)) sendto$inet(r0, &(0x7f0000000180)="cc649bcf1524", 0x6, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f00000006c0)=""/175) write$binfmt_elf64(r0, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0xcea) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f0000000040)={0x7, {0x10000, 0x7fff, 0x31, 0x9, 0x6}}) 15:06:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x20000000000002, 0x70, 0xee6a, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0xc, 0x0, &(0x7f0000000080)=[@free_buffer], 0x0, 0x0, &(0x7f00000001c0)}) 15:06:25 executing program 3: r0 = memfd_create(&(0x7f0000000100)='$y\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000000c0)={0x65a1f993, 0x6, 0x80000001}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000317000), 0xff8) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 15:06:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001400)={&(0x7f00000003c0), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@ipv6_getanyicast={0x14, 0x12, 0x105}, 0x14}}, 0x0) read(r0, &(0x7f0000000040)=""/99, 0x4b8d) 15:06:26 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000000)) 15:06:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x4, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="09631040"], 0x0, 0x0, &(0x7f0000000580)}) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000680)}) 15:06:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000000840), 0x0, 0x4008000, &(0x7f0000000b40)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000000b80)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)="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", 0x5ad}], 0x1, &(0x7f00000036c0)}, 0x0) 15:06:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x84e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000002c0), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) close(r0) 15:06:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d0252926285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001580)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@setlink={0x28, 0x13, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, 0x4}]}, 0x28}}, 0x0) 15:06:27 executing program 5: socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000680)=ANY=[]}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/177, 0xb1}], 0x1) [ 1783.303464] kauditd_printk_skb: 190 callbacks suppressed [ 1783.303473] audit: type=1400 audit(1536419187.579:15417): avc: denied { map } for pid=12514 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.349255] audit: type=1400 audit(1536419187.609:15418): avc: denied { map } for pid=12514 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.415553] audit: type=1400 audit(1536419187.609:15419): avc: denied { map } for pid=12514 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000), 0x1c) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1783.530100] audit: type=1400 audit(1536419187.619:15420): avc: denied { map } for pid=12514 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.580105] audit: type=1400 audit(1536419187.619:15421): avc: denied { map } for pid=12514 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.616789] audit: type=1400 audit(1536419187.649:15422): avc: denied { map } for pid=12514 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.643677] audit: type=1400 audit(1536419187.659:15423): avc: denied { map } for pid=12514 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.723406] audit: type=1400 audit(1536419187.659:15424): avc: denied { map } for pid=12514 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:28 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="18"]}) [ 1783.790357] audit: type=1400 audit(1536419187.659:15425): avc: denied { map } for pid=12514 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.850132] audit: type=1400 audit(1536419187.729:15426): avc: denied { map } for pid=12516 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1785.414097] tmpfs: No value for mount option './file0' [ 1788.344464] kauditd_printk_skb: 331 callbacks suppressed [ 1788.344473] audit: type=1400 audit(1536419192.619:15758): avc: denied { map } for pid=12582 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.400279] audit: type=1400 audit(1536419192.659:15759): avc: denied { map } for pid=12582 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.450113] audit: type=1400 audit(1536419192.659:15760): avc: denied { map } for pid=12582 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.500103] audit: type=1400 audit(1536419192.659:15761): avc: denied { map } for pid=12582 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.545072] audit: type=1400 audit(1536419192.659:15762): avc: denied { map } for pid=12582 comm="sh" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.580146] audit: type=1400 audit(1536419192.669:15763): avc: denied { map } for pid=12582 comm="sh" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.640289] audit: type=1400 audit(1536419192.669:15764): avc: denied { map } for pid=12582 comm="sh" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.701148] audit: type=1400 audit(1536419192.719:15765): avc: denied { map } for pid=12584 comm="ip" path="/bin/ip" dev="sda1" ino=1514 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.750102] audit: type=1400 audit(1536419192.719:15766): avc: denied { map } for pid=12584 comm="ip" path="/bin/ip" dev="sda1" ino=1514 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.830174] audit: type=1400 audit(1536419192.719:15767): avc: denied { map } for pid=12584 comm="ip" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.365871] kauditd_printk_skb: 486 callbacks suppressed [ 1793.365881] audit: type=1400 audit(1536419197.639:16254): avc: denied { map } for pid=12631 comm="ip" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.430102] audit: type=1400 audit(1536419197.639:16255): avc: denied { map } for pid=12631 comm="ip" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.480115] audit: type=1400 audit(1536419197.709:16256): avc: denied { map } for pid=12632 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.533131] audit: type=1400 audit(1536419197.709:16257): avc: denied { map } for pid=12632 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.580093] audit: type=1400 audit(1536419197.709:16258): avc: denied { map } for pid=12632 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.630104] audit: type=1400 audit(1536419197.709:16259): avc: denied { map } for pid=12632 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.690140] audit: type=1400 audit(1536419197.739:16260): avc: denied { map } for pid=12632 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.730146] audit: type=1400 audit(1536419197.739:16261): avc: denied { map } for pid=12632 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.780097] audit: type=1400 audit(1536419197.759:16262): avc: denied { map } for pid=12632 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.830100] audit: type=1400 audit(1536419197.759:16263): avc: denied { map } for pid=12632 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.381683] kauditd_printk_skb: 351 callbacks suppressed [ 1798.381692] audit: type=1400 audit(1536419202.659:16615): avc: denied { map } for pid=12678 comm="ip" path="/lib/x86_64-linux-gnu/libresolv-2.13.so" dev="sda1" ino=2715 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.460092] audit: type=1400 audit(1536419202.699:16616): avc: denied { map } for pid=12678 comm="ip" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.530152] audit: type=1400 audit(1536419202.699:16617): avc: denied { map } for pid=12678 comm="ip" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.610129] audit: type=1400 audit(1536419202.699:16618): avc: denied { map } for pid=12678 comm="ip" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.690096] audit: type=1400 audit(1536419202.699:16619): avc: denied { map } for pid=12678 comm="ip" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.760227] audit: type=1400 audit(1536419202.849:16620): avc: denied { map } for pid=12679 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.803797] audit: type=1400 audit(1536419202.849:16621): avc: denied { map } for pid=12679 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.850120] audit: type=1400 audit(1536419202.869:16622): avc: denied { map } for pid=12679 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.899953] audit: type=1400 audit(1536419202.869:16623): avc: denied { map } for pid=12679 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1798.940110] audit: type=1400 audit(1536419202.869:16624): avc: denied { map } for pid=12679 comm="sh" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.405791] kauditd_printk_skb: 466 callbacks suppressed [ 1803.405801] audit: type=1400 audit(1536419207.679:17091): avc: denied { map } for pid=12726 comm="ip" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.461133] audit: type=1400 audit(1536419207.699:17092): avc: denied { map } for pid=12726 comm="ip" path="/lib/x86_64-linux-gnu/libresolv-2.13.so" dev="sda1" ino=2715 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.520236] audit: type=1400 audit(1536419207.699:17093): avc: denied { map } for pid=12726 comm="ip" path="/lib/x86_64-linux-gnu/libresolv-2.13.so" dev="sda1" ino=2715 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.570091] audit: type=1400 audit(1536419207.699:17094): avc: denied { map } for pid=12726 comm="ip" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.620124] audit: type=1400 audit(1536419207.719:17095): avc: denied { map } for pid=12726 comm="ip" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.680132] audit: type=1400 audit(1536419207.719:17096): avc: denied { map } for pid=12726 comm="ip" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.730110] audit: type=1400 audit(1536419207.719:17097): avc: denied { map } for pid=12726 comm="ip" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.790104] audit: type=1400 audit(1536419207.809:17098): avc: denied { map } for pid=12727 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.840107] audit: type=1400 audit(1536419207.809:17099): avc: denied { map } for pid=12727 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.880140] audit: type=1400 audit(1536419207.809:17100): avc: denied { map } for pid=12727 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.433117] kauditd_printk_skb: 366 callbacks suppressed [ 1808.433126] audit: type=1400 audit(1536419212.709:17467): avc: denied { map } for pid=12769 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.485750] audit: type=1400 audit(1536419212.709:17468): avc: denied { map } for pid=12769 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.540134] audit: type=1400 audit(1536419212.709:17469): avc: denied { map } for pid=12769 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.590225] audit: type=1400 audit(1536419212.709:17470): avc: denied { map } for pid=12769 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.617466] audit: type=1400 audit(1536419212.709:17471): avc: denied { map } for pid=12769 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.650130] audit: type=1400 audit(1536419212.709:17472): avc: denied { map } for pid=12769 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.700129] audit: type=1400 audit(1536419212.709:17473): avc: denied { map } for pid=12769 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.760105] audit: type=1400 audit(1536419212.739:17474): avc: denied { map } for pid=12769 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.796759] audit: type=1400 audit(1536419212.739:17475): avc: denied { map } for pid=12769 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.823840] audit: type=1400 audit(1536419212.809:17476): avc: denied { map } for pid=12770 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.520408] kauditd_printk_skb: 479 callbacks suppressed [ 1813.520417] audit: type=1400 audit(1536419217.799:17956): avc: denied { map } for pid=12816 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.590105] audit: type=1400 audit(1536419217.829:17957): avc: denied { map } for pid=12816 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.640134] audit: type=1400 audit(1536419217.829:17958): avc: denied { map } for pid=12816 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.690107] audit: type=1400 audit(1536419217.829:17959): avc: denied { map } for pid=12816 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.740120] audit: type=1400 audit(1536419217.849:17960): avc: denied { map } for pid=12816 comm="sh" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.790115] audit: type=1400 audit(1536419217.849:17961): avc: denied { map } for pid=12816 comm="sh" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.840113] audit: type=1400 audit(1536419217.849:17962): avc: denied { map } for pid=12816 comm="sh" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.910126] audit: type=1400 audit(1536419217.909:17963): avc: denied { map } for pid=12817 comm="ip" path="/bin/ip" dev="sda1" ino=1514 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1813.950119] audit: type=1400 audit(1536419217.909:17964): avc: denied { map } for pid=12817 comm="ip" path="/bin/ip" dev="sda1" ino=1514 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1814.000109] audit: type=1400 audit(1536419217.919:17965): avc: denied { map } for pid=12817 comm="ip" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.547814] kauditd_printk_skb: 379 callbacks suppressed [ 1818.547823] audit: type=1400 audit(1536419222.819:18345): avc: denied { map } for pid=12859 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.600132] audit: type=1400 audit(1536419222.859:18346): avc: denied { map } for pid=12859 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.650120] audit: type=1400 audit(1536419222.859:18347): avc: denied { map } for pid=12859 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.700100] audit: type=1400 audit(1536419222.859:18348): avc: denied { map } for pid=12859 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.750110] audit: type=1400 audit(1536419222.889:18349): avc: denied { map } for pid=12859 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.800120] audit: type=1400 audit(1536419222.889:18350): avc: denied { map } for pid=12859 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.850943] audit: type=1400 audit(1536419222.909:18351): avc: denied { map } for pid=12859 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.910138] audit: type=1400 audit(1536419222.909:18352): avc: denied { map } for pid=12859 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.960125] audit: type=1400 audit(1536419222.909:18353): avc: denied { map } for pid=12859 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1819.010106] audit: type=1400 audit(1536419222.999:18354): avc: denied { map } for pid=12860 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.553246] kauditd_printk_skb: 510 callbacks suppressed [ 1823.553254] audit: type=1400 audit(1536419227.829:18865): avc: denied { map } for pid=12910 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.610185] audit: type=1400 audit(1536419227.869:18866): avc: denied { map } for pid=12910 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.657562] audit: type=1400 audit(1536419227.869:18867): avc: denied { map } for pid=12910 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.711065] audit: type=1400 audit(1536419227.889:18868): avc: denied { map } for pid=12910 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.770206] audit: type=1400 audit(1536419227.889:18869): avc: denied { map } for pid=12910 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.820184] audit: type=1400 audit(1536419227.969:18870): avc: denied { map } for pid=12911 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.870196] audit: type=1400 audit(1536419227.969:18871): avc: denied { map } for pid=12911 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.910131] audit: type=1400 audit(1536419227.969:18872): avc: denied { map } for pid=12911 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.960183] audit: type=1400 audit(1536419227.969:18873): avc: denied { map } for pid=12911 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1824.020118] audit: type=1400 audit(1536419227.989:18874): avc: denied { map } for pid=12911 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.610930] kauditd_printk_skb: 454 callbacks suppressed [ 1828.610938] audit: type=1400 audit(1536419232.889:19329): avc: denied { map } for pid=12965 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.669752] audit: type=1400 audit(1536419232.889:19330): avc: denied { map } for pid=12965 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.720391] audit: type=1400 audit(1536419232.889:19331): avc: denied { map } for pid=12965 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.770275] audit: type=1400 audit(1536419232.889:19332): avc: denied { map } for pid=12965 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.808814] audit: type=1400 audit(1536419232.909:19333): avc: denied { map } for pid=12965 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.860426] audit: type=1400 audit(1536419232.919:19334): avc: denied { map } for pid=12965 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.910203] audit: type=1400 audit(1536419232.919:19335): avc: denied { map } for pid=12965 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.939598] audit: type=1400 audit(1536419232.919:19336): avc: denied { map } for pid=12965 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1828.966218] audit: type=1400 audit(1536419232.919:19337): avc: denied { map } for pid=12965 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1829.020109] audit: type=1400 audit(1536419232.979:19338): avc: denied { map } for pid=12966 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1833.678779] kauditd_printk_skb: 530 callbacks suppressed [ 1833.678789] audit: type=1400 audit(1536419237.949:19869): avc: denied { map } for pid=13020 comm="ip" path="/bin/ip" dev="sda1" ino=1514 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1833.730128] audit: type=1400 audit(1536419237.969:19870): avc: denied { map } for pid=13020 comm="ip" path="/bin/ip" dev="sda1" ino=1514 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1833.780117] audit: type=1400 audit(1536419237.969:19871): avc: denied { map } for pid=13020 comm="ip" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1833.850172] audit: type=1400 audit(1536419237.969:19872): avc: denied { map } for pid=13020 comm="ip" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1833.930122] audit: type=1400 audit(1536419237.989:19873): avc: denied { map } for pid=13020 comm="ip" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1833.980158] audit: type=1400 audit(1536419237.989:19874): avc: denied { map } for pid=13020 comm="ip" path="/lib/x86_64-linux-gnu/libresolv-2.13.so" dev="sda1" ino=2715 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1834.030162] audit: type=1400 audit(1536419237.989:19875): avc: denied { map } for pid=13020 comm="ip" path="/lib/x86_64-linux-gnu/libresolv-2.13.so" dev="sda1" ino=2715 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1834.080167] audit: type=1400 audit(1536419238.009:19876): avc: denied { map } for pid=13020 comm="ip" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1834.150211] audit: type=1400 audit(1536419238.009:19877): avc: denied { map } for pid=13020 comm="ip" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1834.200172] audit: type=1400 audit(1536419238.029:19878): avc: denied { map } for pid=13020 comm="ip" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:21 executing program 6: unshare(0x40000000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) socket$inet_udp(0x2, 0x2, 0x0) 15:07:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fcntl$getflags(r0, 0x3) 15:07:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[]}], 0x1, &(0x7f0000000040)}, 0x0) 15:07:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") sendmmsg$unix(r0, &(0x7f00000025c0)=[{&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000300)="d4", 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}], 0x1, 0x0) 15:07:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x100000004e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000004040)=[{{&(0x7f0000001580)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000240)="606e4e59be899542e7d36ac17957d7150942a440b9b3a513dfe4b8e2676415672c4bbc76e920ca0d6507559f955a547af09380d022d074350ff402415ab7f1ab8655197f0e9537ac63a6a8afa63c007d7ceac2a955d2f1d18148294e58061549442a31fb25c7c45c1e47ec41a7", 0x6d}], 0x1}}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/145, 0x91) 15:07:21 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x16, 0x5f, &(0x7f0000000280)="8a3fd939679faea36511e5b7ccb9818594d2e0dcc128", &(0x7f0000000380)=""/95}, 0x28) 15:07:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000600)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0xffffffffffffffff, 0x378}, 0x2c) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000081c0)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000082c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000008600)={&(0x7f0000008300)={0x120, 0x0, 0x0, 0x70bd27, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}, {{0x8, 0x1, r3}, {0xf8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}]}, 0x120}}, 0x8040) dup2(r1, r0) syz_open_pts(0xffffffffffffffff, 0x0) 15:07:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') ioctl$VT_RELDISP(r1, 0xb701) 15:07:21 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) 15:07:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, &(0x7f0000000200), 0x10000003) 15:07:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f0000000000)='./file0\x00') 15:07:22 executing program 5: r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0x19) 15:07:22 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000240)) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007fafb7a41cb22da280000206000000a843096c37234a39000b00210008004b00ca8a9848a3090000006b7b31afdc1338d54400009b84136ef75afb83de441100d42c44e82afc5349fddd4ab94e7162", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) 15:07:22 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 15:07:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000380)=0x4, 0x4) 15:07:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="300000002000090500000000000000000200000000000000000000000c000000080002007f00000108000b00001ab10031929a800632cc95b84cb84a05922640004e2f8dfd95d11e6587151eee5bf0044b6f5d634f078049bbbc09e5c07e92c79e796645454dab45188beafdef56437f511edd8fe96af27c9f783672f17fa725df2fbc3dd929a37d7a01ad83a1bc8fdfa03afcd4a55b2326aa06fe8b765425383ee05b63884d73c3f426851df8c9695d3ea824e62e28918843cd41e5f7b6af2e9347e4a3441d2c4b39ea2d0009e0b14d226aff77219efe24cc7dcc327f57ce"], 0x1}}, 0x0) [ 1841.559283] kauditd_printk_skb: 192 callbacks suppressed [ 1841.559292] audit: type=1400 audit(1536419245.829:20071): avc: denied { map } for pid=13083 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.630107] audit: type=1400 audit(1536419245.879:20072): avc: denied { map } for pid=13083 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.680128] audit: type=1400 audit(1536419245.879:20073): avc: denied { map } for pid=13083 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.730121] audit: type=1400 audit(1536419245.879:20074): avc: denied { map } for pid=13083 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.780139] audit: type=1400 audit(1536419245.899:20075): avc: denied { map } for pid=13083 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.830151] audit: type=1400 audit(1536419245.899:20076): avc: denied { map } for pid=13083 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.856331] audit: type=1400 audit(1536419245.919:20077): avc: denied { map } for pid=13083 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.881511] audit: type=1400 audit(1536419245.919:20078): avc: denied { map } for pid=13083 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.906077] audit: type=1400 audit(1536419245.919:20079): avc: denied { map } for pid=13083 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.931465] audit: type=1400 audit(1536419245.989:20080): avc: denied { map } for pid=13083 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1851.929410] kauditd_printk_skb: 131 callbacks suppressed [ 1851.929419] audit: type=1400 audit(1536419256.199:20212): avc: denied { map } for pid=13091 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1851.990140] audit: type=1400 audit(1536419256.249:20213): avc: denied { map } for pid=13091 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.040149] audit: type=1400 audit(1536419256.249:20214): avc: denied { map } for pid=13091 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.090148] audit: type=1400 audit(1536419256.249:20215): avc: denied { map } for pid=13091 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.150989] audit: type=1400 audit(1536419256.269:20216): avc: denied { map } for pid=13091 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.200153] audit: type=1400 audit(1536419256.269:20217): avc: denied { map } for pid=13091 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.250166] audit: type=1400 audit(1536419256.289:20218): avc: denied { map } for pid=13091 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.300158] audit: type=1400 audit(1536419256.289:20219): avc: denied { map } for pid=13091 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.350145] audit: type=1400 audit(1536419256.289:20220): avc: denied { map } for pid=13091 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.400146] audit: type=1400 audit(1536419256.359:20221): avc: denied { map } for pid=13091 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.329296] kauditd_printk_skb: 119 callbacks suppressed [ 1862.329306] audit: type=1400 audit(1536419266.599:20341): avc: denied { map } for pid=13098 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.380142] audit: type=1400 audit(1536419266.619:20342): avc: denied { map } for pid=13098 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.430140] audit: type=1400 audit(1536419266.619:20343): avc: denied { map } for pid=13098 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.480163] audit: type=1400 audit(1536419266.619:20344): avc: denied { map } for pid=13098 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.530930] audit: type=1400 audit(1536419266.639:20345): avc: denied { map } for pid=13098 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.580125] audit: type=1400 audit(1536419266.639:20346): avc: denied { map } for pid=13098 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.630120] audit: type=1400 audit(1536419266.639:20347): avc: denied { map } for pid=13098 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.680202] audit: type=1400 audit(1536419266.659:20348): avc: denied { map } for pid=13098 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.730152] audit: type=1400 audit(1536419266.659:20349): avc: denied { map } for pid=13098 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.780131] audit: type=1400 audit(1536419266.739:20350): avc: denied { map } for pid=13098 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:48 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clone(0x820002102013fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) 15:07:48 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x8005, &(0x7f0000000b40)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)="e694446313bf3fbb7da9fb7044d8d6bb7449171c7a0931f0", 0x18}], 0x1, &(0x7f00000036c0)}, 0x0) 15:07:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x0, r1}) 15:07:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000002c0)='./bus\x00', 0xa00) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000000c0)) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000140)=0x8) 15:07:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) 15:07:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120100020000001200001900000000"], 0x10}}, 0x0) 15:07:48 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7e, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0xfffffef7) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000180), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) shutdown(r0, 0x1) 15:07:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) 15:07:48 executing program 5: r0 = socket(0x1000100000010, 0x3, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write(r0, &(0x7f00000000c0)="1f0000001e0007f1fff5ff0200000000000000005307a33d6c390836be381b", 0x1f) 15:07:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x820002102013fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) 15:07:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0x10000003) 15:07:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a5c2d0252926285717070") syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 15:07:51 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@delneigh={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) [ 1868.619140] kauditd_printk_skb: 157 callbacks suppressed [ 1868.619149] audit: type=1400 audit(1536419272.889:20508): avc: denied { map } for pid=13138 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1868.690173] audit: type=1400 audit(1536419272.919:20509): avc: denied { map } for pid=13138 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1868.732814] audit: type=1400 audit(1536419272.949:20510): avc: denied { map } for pid=13138 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1868.810130] audit: type=1400 audit(1536419272.949:20511): avc: denied { map } for pid=13138 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1868.840639] audit: type=1400 audit(1536419272.979:20512): avc: denied { map } for pid=13138 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1868.865071] audit: type=1400 audit(1536419272.989:20513): avc: denied { map } for pid=13138 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1868.901460] audit: type=1400 audit(1536419272.989:20514): avc: denied { map } for pid=13138 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1869.050240] audit: type=1400 audit(1536419273.009:20515): avc: denied { map } for pid=13138 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1869.100099] audit: type=1400 audit(1536419273.009:20516): avc: denied { map } for pid=13138 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1869.125479] audit: type=1400 audit(1536419273.019:20517): avc: denied { map } for pid=13138 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000301ffff008f00003d88c2000010ae1b"], 0x14}}, 0x0) 15:07:54 executing program 7: syz_mount_image$msdos(&(0x7f0000000600)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe807, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e666174004004010a0200027400f8", 0x16}], 0x0, &(0x7f0000000000)) 15:07:54 executing program 2: 15:07:55 executing program 1: 15:07:56 executing program 3: 15:07:57 executing program 4: [ 1873.738760] kauditd_printk_skb: 21 callbacks suppressed [ 1873.738770] audit: type=1400 audit(1536419278.009:20539): avc: denied { map } for pid=13148 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.790099] audit: type=1400 audit(1536419278.029:20540): avc: denied { map } for pid=13148 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.840100] audit: type=1400 audit(1536419278.029:20541): avc: denied { map } for pid=13148 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.890104] audit: type=1400 audit(1536419278.029:20542): avc: denied { map } for pid=13148 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.940101] audit: type=1400 audit(1536419278.049:20543): avc: denied { map } for pid=13148 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.990143] audit: type=1400 audit(1536419278.049:20544): avc: denied { map } for pid=13148 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1874.040125] audit: type=1400 audit(1536419278.049:20545): avc: denied { map } for pid=13148 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1874.090116] audit: type=1400 audit(1536419278.069:20546): avc: denied { map } for pid=13148 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1874.140128] audit: type=1400 audit(1536419278.069:20547): avc: denied { map } for pid=13148 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1874.180106] audit: type=1400 audit(1536419278.149:20548): avc: denied { map } for pid=13148 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:59 executing program 6: 15:07:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000004ac0)='~', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x6d56) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) [ 1874.691257] PF_BRIDGE: RTM_DELNEIGH with invalid ifindex 15:07:59 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000c000000000000000800010073667100480002000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 15:07:59 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000280)=0xfffffffffffffff9, 0x4) mkdir(&(0x7f0000000440)='./file0/bus\x00', 0x4) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0), &(0x7f0000000300), 0x0, 0xffffffffffffffff) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180)={0x6d, 0x3}, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000580)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000700)=""/163, 0xa3}, {&(0x7f00000002c0)=""/58, 0x3a}], 0x2, &(0x7f0000000840)=""/88, 0x58, 0x4}, 0x20) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40020000) r2 = creat(&(0x7f0000000200)='./file0/bus\x00', 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="02052bbd7000ffdbdf250d000000080004000400000008000500010000002000010014000300ffffff0d000000000000000000000000080004004e22000008000600061900000800050000080000180002001400010000000000000000000000000000000001240003000800030001000000080007004e2400000800030000000000080007004e220000"], 0x1}}, 0x4000080) r3 = creat(&(0x7f0000000680)='./file0/bus\x00', 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000480)=0x4, 0x4) fcntl$getown(r1, 0x9) getpgrp(r4) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/ipc\x00') 15:08:00 executing program 5: 15:08:00 executing program 5: 15:08:00 executing program 5: 15:08:00 executing program 5: 15:08:01 executing program 5: 15:08:01 executing program 5: [ 1881.810722] kauditd_printk_skb: 151 callbacks suppressed [ 1881.810731] audit: type=1400 audit(1536419286.089:20700): avc: denied { map } for pid=13184 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1881.880132] audit: type=1400 audit(1536419286.089:20701): avc: denied { map } for pid=13184 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1881.940198] audit: type=1400 audit(1536419286.089:20702): avc: denied { map } for pid=13184 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1881.990205] audit: type=1400 audit(1536419286.089:20703): avc: denied { map } for pid=13184 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.040164] audit: type=1400 audit(1536419286.089:20704): avc: denied { map } for pid=13184 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.080144] audit: type=1400 audit(1536419286.129:20705): avc: denied { map } for pid=13184 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.130154] audit: type=1400 audit(1536419286.129:20706): avc: denied { map } for pid=13184 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.180159] audit: type=1400 audit(1536419286.129:20707): avc: denied { map } for pid=13184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.204925] audit: type=1400 audit(1536419286.139:20708): avc: denied { map } for pid=13184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.229972] audit: type=1400 audit(1536419286.139:20709): avc: denied { map } for pid=13184 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes 15:08:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x5f, &(0x7f0000000280)="8a3fd939679faea36511e5b7ccb9", &(0x7f0000000380)=""/95}, 0x28) 15:08:22 executing program 5: 15:08:23 executing program 2: 15:08:25 executing program 1: 15:08:28 executing program 3: 15:08:28 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000340)={0x1, 0x0, 0x12, &(0x7f0000000180)="00ce5bd204025177dc7ece77090047db38f1"}) 15:08:28 executing program 6: 15:08:28 executing program 5: 15:08:28 executing program 4: 15:08:28 executing program 6: 15:08:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setpriority(0x0, r1, 0x6) 15:08:28 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)="7374617409c0d2febcf9df2deac8c177ff171248e911938266057de66cf637bdbf1311920c8a84e4dc8f26eda4dcc3783f9db5116b34d31b0400a5608aaff01e79527a2def1800000000a2c51ab7ac037fd2329ceeb2b44fd468e97d42d14b3d123d3aae86c03800000000008e75ab01e8d178fd322315c0b1fa56ba88cff609e7cad8721472ab0f192d06", 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="bf"], 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 1904.175307] kauditd_printk_skb: 34 callbacks suppressed [ 1904.175316] audit: type=1400 audit(1536419308.449:20744): avc: denied { map } for pid=13200 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.270123] audit: type=1400 audit(1536419308.489:20745): avc: denied { map } for pid=13200 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.340153] audit: type=1400 audit(1536419308.489:20746): avc: denied { map } for pid=13200 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.405244] audit: type=1400 audit(1536419308.489:20747): avc: denied { map } for pid=13200 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.471276] audit: type=1400 audit(1536419308.519:20748): avc: denied { map } for pid=13200 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:08:28 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) unlink(&(0x7f0000000040)='./bus\x00') [ 1904.600524] audit: type=1400 audit(1536419308.519:20749): avc: denied { map } for pid=13200 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.656869] audit: type=1400 audit(1536419308.519:20750): avc: denied { map } for pid=13200 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.750099] audit: type=1400 audit(1536419308.589:20751): avc: denied { map } for pid=13200 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.810097] audit: type=1400 audit(1536419308.589:20752): avc: denied { map } for pid=13200 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.871354] audit: type=1400 audit(1536419308.609:20753): avc: denied { map } for pid=13200 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:08:29 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0x53e4, 0x8004, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000020f, 0x0) 15:08:29 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x856, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) syz_emit_ethernet(0x437, &(0x7f00008bbfba)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x401, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @dccp={{0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "24a589", 0x0, '~9\f'}, "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"}}}}}}, &(0x7f0000775000)) 15:08:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x400000000000010, 0x803, 0x0) write(r1, &(0x7f0000000280)="240000001a0099f0003be90000ed190e020808160000000000ba0080080001007f196be0", 0x24) [ 1910.815236] kauditd_printk_skb: 34 callbacks suppressed [ 1910.815244] audit: type=1400 audit(1536419315.089:20788): avc: denied { map } for pid=13225 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1910.890153] audit: type=1400 audit(1536419315.129:20789): avc: denied { map } for pid=13225 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1910.980113] audit: type=1400 audit(1536419315.129:20790): avc: denied { map } for pid=13225 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1911.050129] audit: type=1400 audit(1536419315.129:20791): avc: denied { map } for pid=13225 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1911.120140] audit: type=1400 audit(1536419315.149:20792): avc: denied { map } for pid=13225 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1911.180206] audit: type=1400 audit(1536419315.149:20793): avc: denied { map } for pid=13225 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1911.230126] audit: type=1400 audit(1536419315.149:20794): avc: denied { map } for pid=13225 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1911.290195] audit: type=1400 audit(1536419315.169:20795): avc: denied { map } for pid=13225 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1911.340150] audit: type=1400 audit(1536419315.169:20796): avc: denied { map } for pid=13225 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1911.390107] audit: type=1400 audit(1536419315.199:20797): avc: denied { map } for pid=13225 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:08:49 executing program 0: 15:08:49 executing program 6: r0 = socket$inet(0x2, 0x6080000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f00000003c0), 0xffffffffffffffc4, 0x1f4, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) [ 1925.629857] kauditd_printk_skb: 12 callbacks suppressed [ 1925.629867] audit: type=1400 audit(1536419329.899:20810): avc: denied { map } for pid=13236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1925.680134] audit: type=1400 audit(1536419329.919:20811): avc: denied { map } for pid=13236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1925.730105] audit: type=1400 audit(1536419329.919:20812): avc: denied { map } for pid=13236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1925.790114] audit: type=1400 audit(1536419329.919:20813): avc: denied { map } for pid=13236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1925.850112] audit: type=1400 audit(1536419329.939:20814): avc: denied { map } for pid=13236 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1925.900096] audit: type=1400 audit(1536419329.939:20815): avc: denied { map } for pid=13236 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1925.970125] audit: type=1400 audit(1536419329.959:20816): avc: denied { map } for pid=13236 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1926.020113] audit: type=1400 audit(1536419329.959:20817): avc: denied { map } for pid=13236 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1926.044708] audit: type=1400 audit(1536419329.959:20818): avc: denied { map } for pid=13236 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1926.069397] audit: type=1400 audit(1536419329.979:20819): avc: denied { map } for pid=13236 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:08:50 executing program 2: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) bind$unix(r0, &(0x7f0000d77000)=@abs, 0x0) 15:08:53 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000300)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 15:08:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0a5c2d0252926285717070") sendto$inet6(r1, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 15:08:53 executing program 4: 15:08:53 executing program 7: 15:08:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4), 0x1c) close(r0) 15:08:53 executing program 6: 15:08:54 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 15:08:54 executing program 5: 15:08:54 executing program 5: 15:08:54 executing program 6: 15:08:54 executing program 5: 15:08:54 executing program 6: 15:08:54 executing program 5: [ 1930.651545] kauditd_printk_skb: 23 callbacks suppressed [ 1930.651555] audit: type=1400 audit(1536419334.929:20843): avc: denied { map } for pid=13255 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1930.730105] audit: type=1400 audit(1536419334.969:20844): avc: denied { map } for pid=13255 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1930.800120] audit: type=1400 audit(1536419334.969:20845): avc: denied { map } for pid=13255 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1930.860113] audit: type=1400 audit(1536419334.969:20846): avc: denied { map } for pid=13255 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1930.920152] audit: type=1400 audit(1536419335.009:20847): avc: denied { map } for pid=13255 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1930.960899] audit: type=1400 audit(1536419335.029:20848): avc: denied { map } for pid=13255 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1931.010124] audit: type=1400 audit(1536419335.029:20849): avc: denied { map } for pid=13255 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1931.070107] audit: type=1400 audit(1536419335.029:20850): avc: denied { map } for pid=13255 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1931.120103] audit: type=1400 audit(1536419335.059:20851): avc: denied { map } for pid=13255 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1931.160084] audit: type=1400 audit(1536419335.059:20852): avc: denied { map } for pid=13255 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.141204] kauditd_printk_skb: 1 callbacks suppressed [ 1938.141214] audit: type=1400 audit(1536419342.419:20854): avc: denied { map } for pid=13257 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.220122] audit: type=1400 audit(1536419342.419:20855): avc: denied { map } for pid=13257 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.280100] audit: type=1400 audit(1536419342.419:20856): avc: denied { map } for pid=13257 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.350101] audit: type=1400 audit(1536419342.419:20857): avc: denied { map } for pid=13257 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.430138] audit: type=1400 audit(1536419342.439:20858): avc: denied { map } for pid=13257 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.480108] audit: type=1400 audit(1536419342.459:20859): avc: denied { map } for pid=13257 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.530099] audit: type=1400 audit(1536419342.459:20860): avc: denied { map } for pid=13257 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.580094] audit: type=1400 audit(1536419342.459:20861): avc: denied { map } for pid=13257 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.630229] audit: type=1400 audit(1536419342.479:20862): avc: denied { map } for pid=13257 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1938.670160] audit: type=1400 audit(1536419342.529:20863): avc: denied { map } for pid=13257 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:13 executing program 0: 15:09:13 executing program 6: [ 1949.294851] kauditd_printk_skb: 12 callbacks suppressed [ 1949.294859] audit: type=1400 audit(1536419353.569:20876): avc: denied { map } for pid=13264 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.350097] audit: type=1400 audit(1536419353.609:20877): avc: denied { map } for pid=13264 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.393476] audit: type=1400 audit(1536419353.609:20878): avc: denied { map } for pid=13264 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.450132] audit: type=1400 audit(1536419353.609:20879): avc: denied { map } for pid=13264 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.500095] audit: type=1400 audit(1536419353.609:20880): avc: denied { map } for pid=13264 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.540916] audit: type=1400 audit(1536419353.619:20881): avc: denied { map } for pid=13264 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.567075] audit: type=1400 audit(1536419353.619:20882): avc: denied { map } for pid=13264 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.592040] audit: type=1400 audit(1536419353.619:20883): avc: denied { map } for pid=13264 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.616639] audit: type=1400 audit(1536419353.619:20884): avc: denied { map } for pid=13264 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.641382] audit: type=1400 audit(1536419353.659:20885): avc: denied { map } for pid=13264 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:19 executing program 2: 15:09:23 executing program 1: 15:09:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@newlink={0x40, 0x10, 0x3eb80125379cfe6d, 0x0, 0x0, {}, [@IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xffffff9e}, @IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x40}}, 0x0) 15:09:24 executing program 6: 15:09:24 executing program 4: 15:09:24 executing program 5: 15:09:24 executing program 7: 15:09:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) getdents(r0, &(0x7f0000000400)=""/135, 0x74) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) 15:09:24 executing program 5: socketpair$inet6(0xa, 0x0, 0xe3, &(0x7f0000000000)) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000480)="fc00000048000700ab092500090007000aaa51ff010000000000369321000100669800b94b06fe5cc4b91c490a2793ab0324f1ea1b805707ae6e7527c4000000bc0002000000100000000400002e117c22ebc2050900000000000000341720d7d5bbc91a3eae80022c05defd5a32fc83ab82f605f7a0ce62d3d7add5c7ce2d072556fb545c85630289f4f8b29d3e05000e5bba4a463ae40180000040f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb4dd43dd16b0800000000000000e1b529a3e815fd4beabaf9150c3b880f411f46a6b567b4d5715587e659a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de", 0xfc) [ 1960.425881] kauditd_printk_skb: 12 callbacks suppressed [ 1960.425890] audit: type=1400 audit(1536419364.699:20898): avc: denied { map } for pid=13276 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:24 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}}) [ 1960.491797] audit: type=1400 audit(1536419364.699:20899): avc: denied { map } for pid=13276 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.568369] audit: type=1400 audit(1536419364.709:20900): avc: denied { map } for pid=13276 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.643937] audit: type=1400 audit(1536419364.709:20901): avc: denied { map } for pid=13276 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.720171] audit: type=1400 audit(1536419364.739:20902): avc: denied { map } for pid=13276 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.789313] audit: type=1400 audit(1536419364.759:20903): avc: denied { map } for pid=13276 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.846971] audit: type=1400 audit(1536419364.769:20904): avc: denied { map } for pid=13276 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) getsockopt(r1, 0x0, 0xd0, &(0x7f0000001400)=""/203, &(0x7f0000000040)=0xcb) [ 1960.906901] audit: type=1400 audit(1536419364.769:20905): avc: denied { map } for pid=13281 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.986778] audit: type=1400 audit(1536419364.769:20906): avc: denied { map } for pid=13281 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:25 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket(0x11, 0x200000000080002, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$packet_int(r0, 0x107, 0x1, &(0x7f0000001640)=0x3, 0xffffffffffffffaa) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') [ 1961.090159] audit: type=1400 audit(1536419364.799:20907): avc: denied { map } for pid=13276 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:25 executing program 6: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xf0ffff, 0xffffff9e}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) [ 1961.596027] PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex 15:09:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) getsockopt(r1, 0x0, 0xcf, &(0x7f0000001400)=""/203, &(0x7f0000000040)=0xcb) [ 1968.159518] kauditd_printk_skb: 119 callbacks suppressed [ 1968.159528] audit: type=1400 audit(1536419372.429:21027): avc: denied { map } for pid=13320 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.210149] audit: type=1400 audit(1536419372.449:21028): avc: denied { map } for pid=13320 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.260114] audit: type=1400 audit(1536419372.449:21029): avc: denied { map } for pid=13320 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.310114] audit: type=1400 audit(1536419372.449:21030): avc: denied { map } for pid=13320 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.370146] audit: type=1400 audit(1536419372.469:21031): avc: denied { map } for pid=13320 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.410143] audit: type=1400 audit(1536419372.469:21032): avc: denied { map } for pid=13320 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.480160] audit: type=1400 audit(1536419372.489:21033): avc: denied { map } for pid=13320 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.530234] audit: type=1400 audit(1536419372.489:21034): avc: denied { map } for pid=13320 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.580186] audit: type=1400 audit(1536419372.489:21035): avc: denied { map } for pid=13320 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1968.630128] audit: type=1400 audit(1536419372.509:21036): avc: denied { map } for pid=13320 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:43 executing program 0: 15:09:43 executing program 7: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bind(r0, &(0x7f00000001c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x5, 0x5, "8ef90b95a5455028ad66517cce168f7807d74c8a7536dea3a09253d5ae3d914bb9d44f758c7134c4e07fa7477c6958833abf808f0102f1805d7a3103a06415", 0x26}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f00000000c0)=0x65, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) io_setup(0x252, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f00000003c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x80000000, r0, &(0x7f0000000340)="9f5d68092a7b406856ceff9339988b60f73c15634668e354f4f27782238a459dfb3ebd48607558a49c192aff0d56812524474a794ef05d7f89a8f602b3f2476750938d7d3eb91106b98ccc11ddb4f9a5f1d6eef7", 0x54, 0x1f, 0x0, 0x0, 0xffffffffffffff9c}]) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x3f8, 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmmsg(r1, &(0x7f0000003b00)=[{{&(0x7f0000001300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001380)=""/4096, 0x1000}], 0x1, &(0x7f00000023c0)=""/117, 0x75}}], 0x1, 0x0, &(0x7f0000003c40)) ioctl$KDMKTONE(r0, 0x4b30, 0x7a) r3 = getgid() getgroups(0x615, &(0x7f0000000180)=[r3, 0xee00, 0xffffffffffffffff]) setgid(r4) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") [ 1981.729912] kauditd_printk_skb: 12 callbacks suppressed [ 1981.729922] audit: type=1400 audit(1536419385.999:21049): avc: denied { map } for pid=13325 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1981.780278] audit: type=1400 audit(1536419386.019:21050): avc: denied { map } for pid=13325 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1981.830115] audit: type=1400 audit(1536419386.019:21051): avc: denied { map } for pid=13325 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1981.880141] audit: type=1400 audit(1536419386.019:21052): avc: denied { map } for pid=13325 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1981.930118] audit: type=1400 audit(1536419386.039:21053): avc: denied { map } for pid=13325 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1981.980112] audit: type=1400 audit(1536419386.039:21054): avc: denied { map } for pid=13325 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1982.030876] audit: type=1400 audit(1536419386.059:21055): avc: denied { map } for pid=13325 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1982.080124] audit: type=1400 audit(1536419386.059:21056): avc: denied { map } for pid=13325 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1982.130123] audit: type=1400 audit(1536419386.059:21057): avc: denied { map } for pid=13325 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1982.180116] audit: type=1400 audit(1536419386.079:21058): avc: denied { map } for pid=13325 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x8000, &(0x7f0000357000)={0x2, 0x4e20, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000040), 0x355, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x0) 15:09:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 15:09:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/123, 0x7b}], 0x1) 15:09:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setpriority(0x2, r1, 0x0) 15:09:53 executing program 4: 15:09:53 executing program 5: 15:09:53 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$netlink(0x10, 0x3, 0x0) write(r1, &(0x7f0000000080)="2400000024007fffffff9e0000007701000000ff010000000000008af1ffffff0100ff10", 0x24) 15:09:53 executing program 5: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000140)={0x9}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@local}, 0x14) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) 15:09:54 executing program 6: 15:09:54 executing program 6: [ 1990.102624] kauditd_printk_skb: 1 callbacks suppressed [ 1990.102634] audit: type=1400 audit(1536419394.379:21060): avc: denied { map } for pid=13340 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.170161] audit: type=1400 audit(1536419394.379:21061): avc: denied { map } for pid=13340 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.210168] audit: type=1400 audit(1536419394.379:21062): avc: denied { map } for pid=13340 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.260148] audit: type=1400 audit(1536419394.379:21063): avc: denied { map } for pid=13340 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.350117] audit: type=1400 audit(1536419394.409:21064): avc: denied { map } for pid=13340 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.490149] audit: type=1400 audit(1536419394.439:21065): avc: denied { map } for pid=13340 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:54 executing program 6: [ 1990.540094] audit: type=1400 audit(1536419394.439:21066): avc: denied { map } for pid=13340 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.605786] audit: type=1400 audit(1536419394.449:21067): avc: denied { map } for pid=13340 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:54 executing program 6: [ 1990.690148] audit: type=1400 audit(1536419394.479:21068): avc: denied { map } for pid=13340 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.771129] audit: type=1400 audit(1536419394.489:21069): avc: denied { map } for pid=13340 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:09:55 executing program 5: 15:09:55 executing program 6: [ 1998.282542] kauditd_printk_skb: 23 callbacks suppressed [ 1998.282550] audit: type=1400 audit(1536419402.559:21093): avc: denied { map } for pid=13352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.370137] audit: type=1400 audit(1536419402.589:21094): avc: denied { map } for pid=13352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.420122] audit: type=1400 audit(1536419402.589:21095): avc: denied { map } for pid=13352 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.500202] audit: type=1400 audit(1536419402.589:21096): avc: denied { map } for pid=13352 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.550121] audit: type=1400 audit(1536419402.609:21097): avc: denied { map } for pid=13352 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.600101] audit: type=1400 audit(1536419402.629:21098): avc: denied { map } for pid=13352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.684899] audit: type=1400 audit(1536419402.629:21099): avc: denied { map } for pid=13352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.740154] audit: type=1400 audit(1536419402.649:21100): avc: denied { map } for pid=13352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.790108] audit: type=1400 audit(1536419402.649:21101): avc: denied { map } for pid=13352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1998.850196] audit: type=1400 audit(1536419402.669:21102): avc: denied { map } for pid=13352 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:09 executing program 0: 15:10:09 executing program 4: [ 2008.519505] kauditd_printk_skb: 12 callbacks suppressed [ 2008.519514] audit: type=1400 audit(1536419412.789:21115): avc: denied { map } for pid=13357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.570115] audit: type=1400 audit(1536419412.809:21116): avc: denied { map } for pid=13357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.620109] audit: type=1400 audit(1536419412.809:21117): avc: denied { map } for pid=13357 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.670137] audit: type=1400 audit(1536419412.809:21118): avc: denied { map } for pid=13357 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.720158] audit: type=1400 audit(1536419412.829:21119): avc: denied { map } for pid=13357 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.780156] audit: type=1400 audit(1536419412.829:21120): avc: denied { map } for pid=13357 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.830250] audit: type=1400 audit(1536419412.829:21121): avc: denied { map } for pid=13357 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.880150] audit: type=1400 audit(1536419412.849:21122): avc: denied { map } for pid=13357 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.930154] audit: type=1400 audit(1536419412.849:21123): avc: denied { map } for pid=13357 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2008.980208] audit: type=1400 audit(1536419412.879:21124): avc: denied { map } for pid=13357 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:15 executing program 2: 15:10:19 executing program 1: 15:10:19 executing program 3: 15:10:19 executing program 7: 15:10:19 executing program 5: 15:10:19 executing program 6: 15:10:20 executing program 6: 15:10:20 executing program 5: 15:10:20 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'lo\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000000c0000000000000008000100736671004800020000000000000000000000000000004fcc2b92610ef80ae4856f94000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 15:10:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@local}, 0x14) [ 2016.005788] kauditd_printk_skb: 1 callbacks suppressed [ 2016.005797] audit: type=1400 audit(1536419420.279:21126): avc: denied { map } for pid=13362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.090112] audit: type=1400 audit(1536419420.279:21127): avc: denied { map } for pid=13362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.180145] audit: type=1400 audit(1536419420.299:21128): avc: denied { map } for pid=13362 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.260320] audit: type=1400 audit(1536419420.319:21129): avc: denied { map } for pid=13362 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:20 executing program 6: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) uname(&(0x7f0000000240)=""/210) [ 2016.349793] audit: type=1400 audit(1536419420.329:21130): avc: denied { map } for pid=13362 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.423977] audit: type=1400 audit(1536419420.329:21131): avc: denied { map } for pid=13362 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.516875] audit: type=1400 audit(1536419420.359:21132): avc: denied { map } for pid=13362 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.620948] audit: type=1400 audit(1536419420.359:21133): avc: denied { map } for pid=13362 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.684933] audit: type=1400 audit(1536419420.359:21134): avc: denied { map } for pid=13362 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2016.735237] audit: type=1400 audit(1536419420.389:21135): avc: denied { map } for pid=13362 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x6001000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xf0ffff, 0xffffff9e}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 15:10:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0a5c2d0252926285717070") r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f00000000c0)="3e0000004f001f00ff03f4f90023040000020100020800028001cba800548991de4d73b82e1aa411dfef05e761808f92f8e4f684b78c650cb3f8b645bb9b", 0x3e) setsockopt$inet_buf(r2, 0x0, 0x3f, &(0x7f00000001c0)="1118e2d8ce8c76f306934c84158bba71cacf314de108b694f21dc97129109e7a7f5c4682841500f325ae1e64e0f41ea9e96b4003255e4b03ccb423024a90e682a0900d7ba24a363707f4e8e0b0e8118f80cae3178aed12cfbf7f213679cd4e4ead30267dc50dcc2163c3036ea9617d7ed662d9bf0c974d6983d6e0df970bc65b484796e6fb4735a47b82c62e5e585ebee7fa482fe155ce3ab979ab39187212ed9418e285430c8cdea23b", 0xaa) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180)=0x1, 0x4) socket$nl_generic(0x10, 0x3, 0x10) close(r2) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) [ 2018.693307] PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex [ 2018.698929] PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex 15:10:23 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000001c0012000c00010067726574617000000c0000000000000000000000"], 0x1}}, 0x0) [ 2023.064654] kauditd_printk_skb: 60 callbacks suppressed [ 2023.064663] audit: type=1400 audit(1536419427.339:21196): avc: denied { map } for pid=13395 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.120277] audit: type=1400 audit(1536419427.339:21197): avc: denied { map } for pid=13395 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.194307] audit: type=1400 audit(1536419427.339:21198): avc: denied { map } for pid=13395 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.240139] audit: type=1400 audit(1536419427.349:21199): avc: denied { map } for pid=13395 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.290134] audit: type=1400 audit(1536419427.349:21200): avc: denied { map } for pid=13395 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.340175] audit: type=1400 audit(1536419427.379:21201): avc: denied { map } for pid=13395 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.390118] audit: type=1400 audit(1536419427.379:21202): avc: denied { map } for pid=13395 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.440206] audit: type=1400 audit(1536419427.399:21203): avc: denied { map } for pid=13395 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.490147] audit: type=1400 audit(1536419427.399:21204): avc: denied { map } for pid=13395 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2023.540143] audit: type=1400 audit(1536419427.429:21205): avc: denied { map } for pid=13395 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:40 executing program 0: 15:10:40 executing program 6: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000efd0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfdfd, &(0x7f0000000140)="ef"}) [ 2035.817216] kauditd_printk_skb: 23 callbacks suppressed [ 2035.817225] audit: type=1400 audit(1536419440.089:21229): avc: denied { set_context_mgr } for pid=13402 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 2035.824457] binder: 13402:13403 ioctl c0306201 2000efd0 returned -11 [ 2036.061349] audit: type=1400 audit(1536419440.339:21230): avc: denied { map } for pid=13404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.120197] audit: type=1400 audit(1536419440.359:21231): avc: denied { map } for pid=13404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.160142] audit: type=1400 audit(1536419440.359:21232): avc: denied { map } for pid=13404 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.220146] audit: type=1400 audit(1536419440.379:21233): avc: denied { map } for pid=13404 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.270143] audit: type=1400 audit(1536419440.379:21234): avc: denied { map } for pid=13404 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.330198] audit: type=1400 audit(1536419440.409:21235): avc: denied { map } for pid=13404 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.356988] audit: type=1400 audit(1536419440.409:21236): avc: denied { map } for pid=13404 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.382952] audit: type=1400 audit(1536419440.429:21237): avc: denied { map } for pid=13404 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.407489] audit: type=1400 audit(1536419440.429:21238): avc: denied { map } for pid=13404 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:44 executing program 2: 15:10:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21}, 0x1c) syz_emit_ethernet(0x32, &(0x7f000018f000)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) 15:10:48 executing program 3: 15:10:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027000f8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 15:10:48 executing program 7: 15:10:48 executing program 4: 15:10:48 executing program 6: 15:10:48 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480), 0xc, &(0x7f00000000c0)={&(0x7f0000000640)={0x14, 0x18, 0xfdfffffffffffffd, 0x0, 0x0, {0x7592da19}}, 0x14}}, 0x0) [ 2044.058472] kauditd_printk_skb: 13 callbacks suppressed [ 2044.058482] audit: type=1400 audit(1536419448.329:21252): avc: denied { map } for pid=13410 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2044.143457] audit: type=1400 audit(1536419448.379:21253): avc: denied { map } for pid=13410 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2044.253548] audit: type=1400 audit(1536419448.379:21254): avc: denied { map } for pid=13410 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2044.337951] audit: type=1400 audit(1536419448.379:21255): avc: denied { map } for pid=13410 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4d) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="14000000000000000100000024000000a6000000"], 0x14}}], 0x1, 0x0) [ 2044.419162] audit: type=1400 audit(1536419448.389:21256): avc: denied { map } for pid=13410 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:48 executing program 6: r0 = socket(0xa, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/177, 0xb1}], 0x1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) [ 2044.530117] audit: type=1400 audit(1536419448.389:21257): avc: denied { map } for pid=13410 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2044.620142] audit: type=1400 audit(1536419448.419:21258): avc: denied { map } for pid=13410 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2044.689867] audit: type=1400 audit(1536419448.419:21259): avc: denied { map } for pid=13410 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB="852a6273", @ANYRES64=0x0], @ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000680)}) [ 2044.753574] audit: type=1400 audit(1536419448.419:21260): avc: denied { map } for pid=13410 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2044.816118] hid-generic 0000:0000:0000.0010: unknown main item tag 0x6 [ 2044.816134] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2044.818356] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz1 [ 2044.918980] audit: type=1400 audit(1536419448.529:21261): avc: denied { map } for pid=13412 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:10:49 executing program 5: socket$inet6(0xa, 0x0, 0x1) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 15:10:49 executing program 6: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000200)="7fa3f6a156", 0x5, 0xfffffffffffffffe) 15:10:50 executing program 5: clone(0x0, &(0x7f0000000280)="a0b6e1bb484ec8a7b3cd17538b1b932820b8af8c1607eba460fd438108f3130378c7354e51af2732b7df9f3ab709b66eea4cf7271dcdf763ae17986d7570ed2d31a04ca4e3d8d4bccbd1b157edca4e72d21923720e8004654637024ce51905f90a24", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000000c0)) r4 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0xfd}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000100)=0xfffffffffffffdfe) [ 2050.620569] kauditd_printk_skb: 125 callbacks suppressed [ 2050.620578] audit: type=1400 audit(1536419454.899:21387): avc: denied { map } for pid=13454 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2050.670109] audit: type=1400 audit(1536419454.919:21388): avc: denied { map } for pid=13454 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2050.720141] audit: type=1400 audit(1536419454.929:21389): avc: denied { map } for pid=13454 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2050.780180] audit: type=1400 audit(1536419454.929:21390): avc: denied { map } for pid=13454 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2050.820179] audit: type=1400 audit(1536419454.949:21391): avc: denied { map } for pid=13454 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2050.870138] audit: type=1400 audit(1536419454.949:21392): avc: denied { map } for pid=13454 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2050.933520] audit: type=1400 audit(1536419454.949:21393): avc: denied { map } for pid=13454 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2050.990156] audit: type=1400 audit(1536419454.979:21394): avc: denied { map } for pid=13454 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.014337] audit: type=1400 audit(1536419454.979:21395): avc: denied { map } for pid=13454 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.039158] audit: type=1400 audit(1536419454.999:21396): avc: denied { map } for pid=13454 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.360221] kauditd_printk_skb: 12 callbacks suppressed [ 2057.360230] audit: type=1400 audit(1536419461.619:21409): avc: denied { map } for pid=13459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.420093] audit: type=1400 audit(1536419461.639:21410): avc: denied { map } for pid=13459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.460091] audit: type=1400 audit(1536419461.639:21411): avc: denied { map } for pid=13459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.511076] audit: type=1400 audit(1536419461.639:21412): avc: denied { map } for pid=13459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.560093] audit: type=1400 audit(1536419461.659:21413): avc: denied { map } for pid=13459 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.620123] audit: type=1400 audit(1536419461.659:21414): avc: denied { map } for pid=13459 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.670153] audit: type=1400 audit(1536419461.679:21415): avc: denied { map } for pid=13459 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.720103] audit: type=1400 audit(1536419461.679:21416): avc: denied { map } for pid=13459 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.770120] audit: type=1400 audit(1536419461.679:21417): avc: denied { map } for pid=13459 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2057.820182] audit: type=1400 audit(1536419461.699:21418): avc: denied { map } for pid=13459 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:11:03 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x80000001, 0x1, 0x1000, 0x20, 0x7, 0x4}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000000c0)={0x3, 0x3, 0x2b, 0x4}) dup(r0) fcntl$setstatus(r0, 0x4, 0x2000) 15:11:03 executing program 0: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000040)={0x7f, 0x0, 0x1f}) creat(&(0x7f0000000140)='./file0\x00', 0x110) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x1000001, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) creat(&(0x7f0000001380)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4000) write$selinux_create(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='s'], 0x1) write$selinux_access(r2, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd'}, 0xfffffeff) 15:11:06 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$inet6_udp_int(r0, 0x11, 0x140000000000b, &(0x7f0000000080)=0xfffffffffffffffc, 0x4) 15:11:11 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x8, 0x394, 0x44, 0x3f, 0x5}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x602}) 15:11:11 executing program 7: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="1fc20a74ec07f57aff01171f52d5185a", 0x10) connect$netlink(0xffffffffffffffff, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x1}, 0xfffffffffffffc30) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="1803590e7000fffb4c25010000000800050072090000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x3fff) futimesat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={{}, {0x0, 0x2710}}) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) ftruncate(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/l2cap\x00') ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) 15:11:11 executing program 4: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000240)=0x1c) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x80000027) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setns(0xffffffffffffffff, 0x20000000) fcntl$addseals(r3, 0x409, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x40000) write$P9_RLERROR(r1, &(0x7f0000000040)=ANY=[], 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000280)={0x8000, 0x100000001, 0x3}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) fcntl$setflags(r1, 0x2, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) getsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000140)={@local, 0x0}, &(0x7f0000000180)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000001c0)={r5, @broadcast, @multicast1}, 0xc) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000400)='dctcp-reno\x00', 0x1e4) ftruncate(r2, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x16}, 0x5, 0x2, 0x1, 0x2, 0x69, 0x0, 0x1ff}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="000127bd7000000000800700000008000600070000000c00010008000100020000000800040008000000"], 0x1}}, 0x4) 15:11:11 executing program 5: capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) r0 = memfd_create(&(0x7f0000000000)='mime_typeppp0-cgroup\x00', 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 15:11:11 executing program 6: socket(0xa, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/177, 0xb1}], 0x1) 15:11:11 executing program 3: r0 = dup(0xffffffffffffffff) timerfd_gettime(r0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000180)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 15:11:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x29f) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000001c0)='loginuid\x00') clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x8, 0x7, 0x0, 0x9, 0x3000, 0x0, 0x32e6, 0x6, 0x5, 0x80000000, 0x54, 0x0, 0x0, 0x99, 0x69ab9ff8, 0x0, 0x5, 0x0, 0x80000000, 0x6, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x1746, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8010, 0x0, 0x0, 0x0, 0xfff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000080)) sendfile(r0, r4, &(0x7f0000000040)=0x78010e08, 0x8001) [ 2067.697110] kauditd_printk_skb: 1 callbacks suppressed [ 2067.697119] audit: type=1400 audit(1536419471.969:21420): avc: denied { map } for pid=13471 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2067.794331] audit: type=1400 audit(1536419471.999:21421): avc: denied { map } for pid=13471 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2067.885635] audit: type=1400 audit(1536419472.009:21422): avc: denied { map } for pid=13471 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2067.951671] audit: type=1400 audit(1536419472.019:21423): avc: denied { map } for pid=13471 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2067.992114] audit: type=1400 audit(1536419472.039:21424): avc: denied { map } for pid=13471 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2068.040990] audit: type=1400 audit(1536419472.059:21425): avc: denied { map } for pid=13471 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2068.092908] audit: type=1400 audit(1536419472.059:21426): avc: denied { map } for pid=13471 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2068.144612] audit: type=1400 audit(1536419472.109:21427): avc: denied { map } for pid=13471 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2068.197780] audit: type=1400 audit(1536419472.109:21428): avc: denied { map } for pid=13471 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2068.240136] audit: type=1400 audit(1536419472.199:21429): avc: denied { map } for pid=13474 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2068.480757] hid-generic 0000:0000:0000.0011: unknown main item tag 0x6 [ 2068.507119] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 2068.535873] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz1] on syz1 15:11:12 executing program 6: socket(0xa, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/177, 0xb1}], 0x1) 15:11:13 executing program 6: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x4000) fcntl$setstatus(r0, 0x4, 0x8000000000044000) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000180)) io_setup(0x8, &(0x7f0000000200)=0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000040)={0xf}, 0xf) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000640)={0x2, &(0x7f0000000600)=[{0x40, 0x6, 0x80000001, 0x800}, {0x7ff, 0xffffffff, 0x100000001}]}, 0x10) ftruncate(r2, 0x104) ioctl$TIOCCONS(r2, 0x541d) getsockopt$inet6_buf(r2, 0x29, 0xd7, &(0x7f0000000240)=""/199, &(0x7f0000000140)=0xc7) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x3f, &(0x7f0000000580), &(0x7f00000005c0)=0x4) getpeername(r3, &(0x7f0000000380)=@hci={0x1f, 0x0}, &(0x7f0000000400)=0x80) bind$packet(r0, &(0x7f0000000440)={0x11, 0x1f, r4, 0x1, 0x401, 0x6, @dev={[], 0x1b}}, 0x14) ppoll(&(0x7f0000000480)=[{r0, 0x4000}, {r0}, {r2, 0x4203}, {r0, 0x8413}], 0x4, &(0x7f00000004c0), &(0x7f0000000500)={0x6040}, 0x8) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) ioctl(r3, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") creat(&(0x7f0000000340)='./bus\x00', 0x20) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) close(r3) 15:11:14 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/255, 0xffffff34}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000380)=[{r0, 0x200000}], 0x271, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180), 0x8) writev(r0, &(0x7f0000000400)=[{&(0x7f00000014c0)="f9", 0x1}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x50043, 0x0) write$P9_RAUTH(r2, &(0x7f0000000440)={0x14, 0x67, 0x1, {0x0, 0x3, 0x3}}, 0x14) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000240)={0xfff, 0x4, 0x1, 0xffff, 0x1c, 0x9, 0x80000002, 0x7, 0x8c4, 0x200, 0x0, 0x7}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) sendto$unix(r3, &(0x7f0000000180)="f350a76d03c5d273c25486e37c4a52e4b872b21ac82a268d499d928a18683e290a9fd7593669681fbc2aef188f116c73f8db06bfc688c81392919d39309453230381", 0x42, 0x40040, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e23}, 0x6e) mknod(&(0x7f0000000040)='./file0\x00', 0x60, 0x0) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2}) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f0000000300)={'veth1_to_bond\x00', 0x2}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 15:11:14 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) 15:11:15 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) clone(0x2000, &(0x7f00000001c0)="35303985e8c219b1ed74a5a2980cc2164757b87d83b146ad30036286b50875471c5c0fea1ef16cf043d0f113b07fde6428fffb7de5563ca96e2492f86f1b35955c20fa7e00eb106ff3669209785ac1fdc308613b54d07c8f6ee28170890bc5bcc6eee2f4128b2011d710f8f12d1792d0992893b703c0dd2aee377ebe02a1ee02ac2f79546b25f3a3bfee11a487acabc5cb8cf09c9d345879e8fab509ea67f36c5f699c6dc98f962d86ac5c97bdb60f461e0dee340e7d7dcb361198ff26f03be51c3a3702ca91c79e81cee30554ebb4c6d97929aae59a86fea51350e8304065744d986bceb02d829f", &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="a01d6b1421b9426a73c37551fa5b4f019a0c4092232d74c997d22737f2590296cb7112a3bea8b157396cde9224507f829c14ef27bfbcca265317d14632fd805cfe0b92143104c01042029d67b01ac03c1e17ebc61d0e20822e8123ba9df9c0f1eeccb640116ddad0700f1772d1862e74c0b7bb1e5bddc85709f2be83bf89ef744fdd397e1a75c5715cdd04c94ac312ba583d1f1936") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/4\x00') ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x9, 0x5c6a28d}) pipe(&(0x7f0000000180)) 15:11:16 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getresgid(&(0x7f0000000180)=0x0, &(0x7f0000000200), &(0x7f0000000240)) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x25dfdbfd, 0x800}, 0xc) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) sched_setscheduler(r1, 0x2000005, &(0x7f00000001c0)) lseek(r0, 0x0, 0x5) 15:11:16 executing program 6: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0xc201}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) ioctl$TUNSETPERSIST(r0, 0x800454dd, 0x709000) poll(&(0x7f0000000000)=[{r2}, {r1}, {r1, 0x80}, {r2, 0x4}, {r0, 0x4010}, {r2, 0x200}], 0x6, 0x8) [ 2072.756237] kauditd_printk_skb: 114 callbacks suppressed [ 2072.756245] audit: type=1400 audit(1536419477.029:21544): avc: denied { map } for pid=13528 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2072.845688] audit: type=1400 audit(1536419477.069:21545): avc: denied { map } for pid=13528 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2072.891272] audit: type=1400 audit(1536419477.069:21546): avc: denied { map } for pid=13528 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2072.940269] audit: type=1400 audit(1536419477.069:21547): avc: denied { map } for pid=13528 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2072.977330] audit: type=1400 audit(1536419477.069:21548): avc: denied { map } for pid=13528 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2073.001562] audit: type=1400 audit(1536419477.079:21549): avc: denied { map } for pid=13528 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2073.026545] audit: type=1400 audit(1536419477.079:21550): avc: denied { map } for pid=13528 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2073.051602] audit: type=1400 audit(1536419477.089:21551): avc: denied { map } for pid=13528 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2073.077008] audit: type=1400 audit(1536419477.089:21552): avc: denied { map } for pid=13528 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2073.101458] audit: type=1400 audit(1536419477.089:21553): avc: denied { map } for pid=13528 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.166624] kauditd_printk_skb: 1 callbacks suppressed [ 2078.166634] audit: type=1400 audit(1536419482.439:21555): avc: denied { map } for pid=13532 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.250155] audit: type=1400 audit(1536419482.439:21556): avc: denied { map } for pid=13532 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.320130] audit: type=1400 audit(1536419482.449:21557): avc: denied { map } for pid=13532 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.390115] audit: type=1400 audit(1536419482.449:21558): avc: denied { map } for pid=13532 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.480142] audit: type=1400 audit(1536419482.479:21559): avc: denied { map } for pid=13532 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.550138] audit: type=1400 audit(1536419482.479:21560): avc: denied { map } for pid=13532 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.610107] audit: type=1400 audit(1536419482.479:21561): avc: denied { map } for pid=13532 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.660106] audit: type=1400 audit(1536419482.499:21562): avc: denied { map } for pid=13532 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.710090] audit: type=1400 audit(1536419482.499:21563): avc: denied { map } for pid=13532 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.750298] audit: type=1400 audit(1536419482.519:21564): avc: denied { map } for pid=13532 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:11:24 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) creat(&(0x7f0000000240)='./file0\x00', 0x60) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000100)=@ethtool_coalesce={0xe, 0xfffffffffffffd76, 0xffffffff}}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x180, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f00000001c0)=0x10) 15:11:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl(r2, 0x4000008907, &(0x7f0000001300)) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000000), 0x4) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) recvmsg(r2, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000100)=0x10000) [ 2093.074771] kauditd_printk_skb: 1 callbacks suppressed [ 2093.074780] audit: type=1400 audit(1536419497.349:21566): avc: denied { map } for pid=13537 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.130092] audit: type=1400 audit(1536419497.349:21567): avc: denied { map } for pid=13537 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.170883] audit: type=1400 audit(1536419497.349:21568): avc: denied { map } for pid=13537 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.250129] audit: type=1400 audit(1536419497.379:21569): avc: denied { map } for pid=13537 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.300126] audit: type=1400 audit(1536419497.379:21570): avc: denied { map } for pid=13537 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.360161] audit: type=1400 audit(1536419497.399:21571): avc: denied { map } for pid=13537 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.410126] audit: type=1400 audit(1536419497.399:21572): avc: denied { map } for pid=13537 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.460165] audit: type=1400 audit(1536419497.399:21573): avc: denied { map } for pid=13537 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.510153] audit: type=1400 audit(1536419497.419:21574): avc: denied { map } for pid=13537 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.550150] audit: type=1400 audit(1536419497.419:21575): avc: denied { map } for pid=13537 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:11:43 executing program 7: rt_sigpending(&(0x7f0000000000), 0x8) rt_sigsuspend(&(0x7f0000000340)={0x7c16}, 0x8) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000140)={@multicast1, @remote, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000001c0)={@remote, @loopback, r1}, 0xc) 15:11:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x4400) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000180)=""/192) ioctl$TCXONC(r1, 0x540a, 0x1fe000000) r3 = getpid() ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000100)=r3) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000000000)="180003000000010000000000000000000001080203000008000006000e640002b900020000000000000077a107567e5bdba17e19550055040082ec67a100020049fc2d63e00000000000141800d421f3ea66d4d94ac72f0a00000000130000c88ebbff06010000ad000000000000061475d7220342000747ecf48b05000000e7ec75e848ccfff6ba00b3b40f0000c62cc6e96c7a442ef629cd7ed089f74164536dab653681786eaec0ef151332450f779c3165c287b7e75ab4f171793bca8171f33b4fbe8006bcb8", 0xc8) 15:11:44 executing program 4: r0 = epoll_create1(0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x1}) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f00000000c0), 0x8) socket(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x80000, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000220200000000214f28959ec57d0430c83b08000000ffefe5ff00000000000000fe007899de2d445acf51369afd0781957d3a88aaffdb66a660c509ebfdf802e77d1b3ef958f18813b2069446ecf9f70e06796ecb7d960f15aefaa0a1c1a28a206a92c93d4b0765f355029b89b4b2e7d9c01a16d8"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={&(0x7f00000002c0), 0xc, &(0x7f0000000180)={&(0x7f0000000900)=@getpolicy={0x58, 0x15, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@ipv4={[], [], @dev}}}, [@extra_flags={0x8}]}, 0x58}, 0x8}, 0x0) 15:11:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x5, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="0401000000c000ddb8460900ff755b4202938207d9fb3780398d4375000000007911301ee616d5c01843f56590080053c0e385472da7222a2bb42f2d", 0x3c, 0x0, &(0x7f0000000080)={0xa, 0x200800800, 0x6, @ipv4={[], [], @multicast2}}, 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) utimensat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x0, 0x7530}}, 0x100) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000100)) 15:11:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() setuid(0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000001c0)=0x6) r1 = dup2(r0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x24}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x88}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x840000000002, 0x3, 0xff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000053c0)=[{{&(0x7f0000000380)=@alg, 0x80, &(0x7f0000000680)=[{&(0x7f0000000400)=""/178, 0xb2}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/135, 0x87}, {&(0x7f0000000640)=""/1, 0x1}], 0x4, &(0x7f00000006c0)=""/4096, 0x1000, 0x4}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f00000016c0)=""/193, 0xc1}, {&(0x7f00000017c0)}, {&(0x7f0000001800)=""/47, 0x2f}], 0x3, 0x0, 0x0, 0xcad4}, 0x2}, {{&(0x7f0000001880)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001900)=""/160, 0xa0}, {&(0x7f00000019c0)=""/138, 0x8a}, {&(0x7f0000001a80)=""/95, 0x5f}], 0x3, &(0x7f0000001b40)=""/161, 0xa1, 0x6599}, 0x200}, {{0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/189, 0xbd}, {&(0x7f0000001d00)=""/63, 0x3f}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000002d40)=""/253, 0xfd}, {&(0x7f0000002e40)=""/138, 0x8a}, {&(0x7f0000002f00)=""/100, 0x64}, {&(0x7f0000002f80)=""/4096, 0x1000}], 0x8, 0x0, 0x0, 0x8001}, 0x3dd5}, {{&(0x7f0000004000)=@sco, 0x80, &(0x7f00000041c0)=[{&(0x7f0000004080)=""/43, 0x2b}, {&(0x7f00000040c0)=""/102, 0x66}, {&(0x7f0000004140)=""/67, 0x43}], 0x3, &(0x7f0000004200)=""/240, 0xf0, 0x6}, 0x100000000000000}, {{&(0x7f0000004300)=@alg, 0x80, &(0x7f0000004580)=[{&(0x7f0000004380)}, {&(0x7f00000043c0)=""/61, 0x3d}, {&(0x7f0000004400)=""/151, 0x97}, {&(0x7f00000044c0)=""/117, 0x75}, {&(0x7f0000004540)}], 0x5, &(0x7f0000004600)=""/31, 0x1f, 0x9}, 0x7f}, {{&(0x7f0000004640)=@nfc, 0x80, &(0x7f0000004a80)=[{&(0x7f00000046c0)=""/34, 0x22}, {&(0x7f0000004700)=""/174, 0xae}, {&(0x7f00000047c0)=""/212, 0xd4}, {&(0x7f00000048c0)=""/27, 0x1b}, {&(0x7f0000004900)=""/239, 0xef}, {&(0x7f0000004a00)=""/122, 0x7a}], 0x6, &(0x7f0000004b00)=""/101, 0x65, 0x7}, 0x1}, {{&(0x7f0000004b80)=@alg, 0x80, &(0x7f0000004d00)=[{&(0x7f0000004c00)=""/95, 0x5f}, {&(0x7f0000004c80)=""/120, 0x78}], 0x2, 0x0, 0x0, 0xfffffffffffffffb}, 0x3}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000005200)=[{&(0x7f0000004dc0)=""/48, 0x30}, {&(0x7f0000004e00)=""/233, 0xe9}, {&(0x7f0000004f00)=""/162, 0xa2}, {&(0x7f0000004fc0)=""/32, 0x20}, {&(0x7f0000005000)=""/103, 0x67}, {&(0x7f0000005080)=""/23, 0x17}, {&(0x7f00000050c0)=""/48, 0x30}, {&(0x7f0000005100)=""/146, 0x92}, {&(0x7f00000051c0)=""/2, 0x2}], 0x9, &(0x7f00000052c0)=""/249, 0xf9, 0x9}, 0x7fffffff}], 0x9, 0x100, &(0x7f0000005600)={0x77359400}) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x9, 0x0, 0x9, 0x1, 0x0, 0x2, 0x2, 0x5, 0x6c9, 0x7, 0x800, 0x7, 0xfffffffffffffffc, 0x5, 0x81, 0x235, 0x9, 0x8, 0x6, 0x7, 0xfffffffeffffffff, 0x5, 0x7ff, 0x8bda, 0x27a8, 0x0, 0x2, 0x1f, 0x9, 0x3, 0x101, 0x1, 0x6458, 0x0, 0x9, 0x5, 0x0, 0x4, 0x2, @perf_config_ext={0x2000000000000, 0x7}, 0x108, 0x9, 0xf9, 0x7, 0xfff, 0x3, 0x6}, r4, 0x3, r0, 0xa) sendfile(r2, r6, &(0x7f0000000040), 0x100000001) setsockopt$EBT_SO_SET_COUNTERS(r6, 0x0, 0x81, &(0x7f0000000280)=ANY=[@ANYBLOB="62726f7574650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xc8) 15:11:44 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept$inet(r0, &(0x7f0000000200), &(0x7f0000000240)=0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TIOCMBIS(r1, 0x5416, &(0x7f00000000c0)=0x1000) fadvise64(r1, 0x0, 0x200, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)="6c6f00966f380f64a1e3d75d627d1fa159ad34909d60d298000000202759175d1563ca52dd984f43891be784e2058077d27c448d4b144278cb7548c2ee63bf3c3e591afc1f394f4281891836c571406eb4b673b00000000000080000daefec45ecd549b29bfe8d903f00e9e47e673ac1b2616a96bba7e2c0dcf95108eb167f5411d30d37e62266cf8eab640f747082aed2158e2b63f6bfe1343ea62da563ded7abea1ff873329c5646d518fe0e8f20010000792efc2a82a5a17035c87bf7efabe899eb77238a741c80fcb095a2a7d72c595d45388358f546dc882df5b0b55edb1ab6aa14e2b90d685e4a2dd1ba556e04276c1be06fdbc891251cb5bfb690b4c27f5d2fb3e7c92794cf496fdf0495b506841f483edac504209488eb27d43b367fd9992d1b7c478dd4b925aa51a04b100393e1cce76d8027f0a5ed280da80f26b1f3ff300c82255f928b44b9d9e7f2e4c16923dc8741b9c70d92fa1111b51f039ddd1b6adfac67e3a053d38ae16e97eaf5a0270be9a0f12066aa6ecfb569b664bc920bd5381608b35f3aa4210a79c4260a574d4da8c40b9f016ff4ab26b6170250c3214ea18622d704f1c021edffee24c8398c4230d16444e0495088a2f2599a662424f18196f750acca803a21b49423cb5e9f2703e393b982bfcfc4e3f7034f68f272ca8f66bb2f9f2aaf1a20a5a03f254da58698fa342731c70c3ccc40e88aac2edee4c7f59c6ba43021e91424b3056db56ded0c7493d8a3802759b905bb747cbebc7a0af3f570f89f7e1bd00b1c51") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) [ 2101.012123] IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready 15:11:45 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x0, 0x6) write(r0, &(0x7f0000000140)="39d6ee9280b7862a8ab6313ffe3ea8390cbdc67fe4710ead931983a3eda70f3b7fdbbe8b4fc5a185448127ca3e83dc5784f3281a59f9b8f34bc255e933462b92012f8ccfe9545d6d23d15d5daf3d3b3ce3350cbc", 0x54) r1 = getpid() get_robust_list(r1, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f00000002c0), 0x0, &(0x7f0000000340)={&(0x7f0000000300)}}, &(0x7f0000000400)=0x18) r2 = gettid() r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x400000, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000280)={0x31, 0x37, 0x6, 0x7, 0x0, 0x3a, 0x4, 0x4, 0xffffffffffffffff}) r4 = getuid() r5 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r2, r4, r5}, 0xc) r6 = memfd_create(&(0x7f0000000000)="9676626f786e657430626465762c4076626f786e6574305e6d696d655f747970652d2600", 0x1) ioctl$IOC_PR_REGISTER(r6, 0x401870c8, &(0x7f0000000040)={0x8f, 0x1000000000000}) r7 = socket(0x2, 0x200000000080002, 0x0) r8 = getpid() getsockname$netlink(r7, &(0x7f00000001c0), &(0x7f0000000200)=0xc) sched_setscheduler(r8, 0x5, &(0x7f0000000c80)) connect$netlink(r7, &(0x7f00000000c0), 0x9) ioctl$RTC_UIE_ON(r6, 0x7003) [ 2101.331824] IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready [ 2101.540284] kauditd_printk_skb: 12 callbacks suppressed [ 2101.540292] audit: type=1400 audit(1536419505.819:21588): avc: denied { map } for pid=13554 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.598964] audit: type=1400 audit(1536419505.839:21589): avc: denied { map } for pid=13554 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.649362] audit: type=1400 audit(1536419505.849:21590): avc: denied { map } for pid=13554 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.677806] audit: type=1400 audit(1536419505.849:21591): avc: denied { map } for pid=13554 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.727513] audit: type=1400 audit(1536419505.859:21592): avc: denied { map } for pid=13554 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.777822] audit: type=1400 audit(1536419505.869:21593): avc: denied { map } for pid=13554 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.819526] audit: type=1400 audit(1536419505.869:21594): avc: denied { map } for pid=13554 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.846205] audit: type=1400 audit(1536419505.899:21595): avc: denied { map } for pid=13554 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.871180] audit: type=1400 audit(1536419505.899:21596): avc: denied { map } for pid=13554 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.896250] audit: type=1400 audit(1536419505.989:21597): avc: denied { map } for pid=13557 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:11:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000200)=0x101, 0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') readv(r0, &(0x7f0000000180)=[{&(0x7f0000001200)=""/4096, 0xfffffe19}], 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x8) 15:11:46 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3000080}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x80, 0x13, 0xb, 0x401, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x6}, [@generic="5d72c98e3255cd09495d195bf29b7a71ba1bb2013bdde4a04068006b2677c6a566225aaae9add4856d5a18f4d6bf75b4d13c2cc01cac4a1f3d3fcc4aebcee8f3e88b20627732f357719570bc29f1bd33d5653970aa01e3f10f7a521792f192", @typed={0xc, 0x19, @u64=0x200}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x0) fcntl$setstatus(r1, 0x4, 0x40000) write$P9_RLERROR(r0, &(0x7f00000000c0)=ANY=[], 0x0) unshare(0x40000000) fcntl$setflags(r0, 0x2, 0x1) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x58a, 0x20000) 15:11:50 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x2100c0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) ioctl(r0, 0x23, &(0x7f0000000000)="22dda18ddae70b08e39f3e1e0ca12249a9fb367072ba7b1750051327613fcbfefe4b896cbbe32dc4a300497df57ec0adcd637c9b520a618e944bff23b0c62d88650bde942fc1afad9906ee95d2f23302d3a0883fef04362435742cef6aed91722a2d") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 15:11:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000100)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000000180)) getsockname(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f00000000c0)=0x80) bind(r0, &(0x7f0000000300)=@nl=@kern={0x10, 0x0, 0x0, 0x8000200}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') signalfd4(r1, &(0x7f00000001c0)={0x7e41afee}, 0x8, 0x80000) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 15:11:53 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000100)=0x81, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000014c0)=""/224) getsockopt(r2, 0x5, 0x0, &(0x7f00000004c0)=""/4096, &(0x7f00000000c0)=0x1000) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000340)=@generic={0x0, 0x2, 0x3}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socket(0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) signalfd(r0, &(0x7f0000000140)={0x9}, 0x8) shutdown(r1, 0x1) ioctl$void(0xffffffffffffffff, 0x0) r3 = gettid() get_robust_list(r3, &(0x7f0000001640)=&(0x7f0000000440)={&(0x7f00000001c0)={&(0x7f0000000180)}, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)}}, &(0x7f0000001680)=0x18) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x6, 0xfffffffffffffffa}, 0xa) epoll_pwait(0xffffffffffffffff, &(0x7f00000015c0)=[{}, {}, {}, {}, {}], 0x5, 0x7f, &(0x7f0000001600)={0x2}, 0x8) [ 2108.974385] kauditd_printk_skb: 26 callbacks suppressed [ 2108.974394] audit: type=1400 audit(1536419513.249:21624): avc: denied { map } for pid=13574 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2109.070165] audit: type=1400 audit(1536419513.249:21625): avc: denied { map } for pid=13574 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2109.150160] audit: type=1400 audit(1536419513.259:21626): avc: denied { map } for pid=13574 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2109.240120] audit: type=1400 audit(1536419513.269:21627): avc: denied { map } for pid=13574 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:11:53 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x200000000001b, &(0x7f0000000040)={@remote}, 0x431848c902554988) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000000)) [ 2109.320118] audit: type=1400 audit(1536419513.279:21628): avc: denied { map } for pid=13574 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2109.400134] audit: type=1400 audit(1536419513.289:21629): avc: denied { map } for pid=13574 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2109.470111] audit: type=1400 audit(1536419513.289:21630): avc: denied { map } for pid=13574 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2109.540107] audit: type=1400 audit(1536419513.299:21631): avc: denied { map } for pid=13574 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:11:53 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x200000000001b, &(0x7f0000000040)={@remote}, 0x431848c902554988) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000000)) [ 2109.640121] audit: type=1400 audit(1536419513.309:21632): avc: denied { map } for pid=13574 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2109.720098] audit: type=1400 audit(1536419513.309:21633): avc: denied { map } for pid=13575 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:11:54 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x200000000001b, &(0x7f0000000040)={@remote}, 0x431848c902554988) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000000)) 15:12:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x2, 0x722, 0x9, 0x6, 0x0, 0x800, 0x2201, 0xd, 0x7fff, 0x4, 0x0, 0x94c8, 0x200, 0x3ff, 0xfff, 0x9, 0x9, 0x4, 0x0, 0x833b, 0xfffffffffffff001, 0x4, 0x7, 0x80000000, 0x80000000, 0x62b, 0x1, 0x80, 0x0, 0x7, 0x40000000000000, 0x4, 0xad, 0x6, 0xf4, 0x6, 0x0, 0x3f1bffa3, 0x4, @perf_config_ext={0x8, 0x2}, 0x200, 0x0, 0x2e, 0x7, 0xfffffffffffffffb, 0xfffffffffffffff7}, r1, 0x1, r2, 0x1) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r4 = dup3(r0, r0, 0x80000) r5 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) pread64(r3, &(0x7f0000000340)=""/39, 0xb, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="03000000000000000000080000000000"], 0x28}}, 0x0) dup2(r0, r3) setsockopt$inet_udp_int(r4, 0x11, 0x67, &(0x7f0000000240)=0x5, 0x4) 15:12:00 executing program 6: syz_emit_ethernet(0x16, &(0x7f0000000000)={@broadcast, @random="3c5151c8bb67", [], {@generic={0x8864, "4a575dd1907c0057"}}}, &(0x7f0000000100)) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw6\x00') ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r1) 15:12:00 executing program 4: clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x2) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@hci, &(0x7f00000000c0)=0x80, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) futex(&(0x7f0000000100), 0xb, 0x1, &(0x7f0000000180)={0x77359400}, &(0x7f0000000280)=0x2, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) getpid() futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000240), 0x0) 15:12:00 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)="73797a6b610000000500f3", 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r2 = fcntl$dupfd(r1, 0x404, r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r3, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4611}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x40050) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x9d, &(0x7f00000000c0)="e46001923406080000000a9b05dd", &(0x7f0000000300)=""/157, 0xea74}, 0x28) [ 2116.165550] kauditd_printk_skb: 70 callbacks suppressed [ 2116.165560] audit: type=1400 audit(1536419520.439:21704): avc: denied { map } for pid=13600 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.250146] audit: type=1400 audit(1536419520.439:21705): avc: denied { map } for pid=13600 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.340135] audit: type=1400 audit(1536419520.449:21706): avc: denied { map } for pid=13600 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.462454] audit: type=1400 audit(1536419520.449:21707): avc: denied { map } for pid=13600 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.510769] audit: type=1400 audit(1536419520.479:21708): avc: denied { map } for pid=13600 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.677256] audit: type=1400 audit(1536419520.479:21710): avc: denied { map } for pid=13600 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.728433] audit: type=1400 audit(1536419520.479:21709): avc: denied { prog_load } for pid=13601 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2116.775618] audit: type=1400 audit(1536419520.489:21711): avc: denied { map } for pid=13600 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.825548] audit: type=1400 audit(1536419520.499:21712): avc: denied { map } for pid=13600 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.880772] audit: type=1400 audit(1536419520.499:21713): avc: denied { map } for pid=13600 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:12:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa, 0x8000, r1, &(0x7f0000000240)="1aad49ced8fd253960ea64124c9cae7c602aea20cdbb7e5bed9ec3ba0905f0c100f11ecea9df1bf5188f9eb448992f04402fe510d639d2197baa30bd7d93b048b659282ea5e29d33a1c0709de80f1035b76ee99df413753590ff39b117ba972615b7493f90107f4f95d6fddee4e830e523b641836c794fd574f1d1b60fc3d0d4014af6f92ec985f8aeac19a098fb2a0b647f74ce63c639f3994bedaccb9763eb3fa536b011936c862a0d19d316fc342823d8f2b788c42ca28746622c692b7d65fd992fc7518220163f18a2b723cb40243f88f2108bf1f238bb655d5a9f27ecd5f77c628e8f1f17", 0xe7, 0x1, 0x0, 0x2, r1}, &(0x7f0000000100)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x50, r1, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800280}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, r2, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3d}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004050}, 0x84) ioctl$int_out(r0, 0x0, &(0x7f0000000080)) [ 2125.150350] kauditd_printk_skb: 39 callbacks suppressed [ 2125.150359] audit: type=1400 audit(1536419529.429:21753): avc: denied { map } for pid=13609 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.200172] audit: type=1400 audit(1536419529.429:21754): avc: denied { map } for pid=13609 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.270237] audit: type=1400 audit(1536419529.429:21755): avc: denied { map } for pid=13609 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.330094] audit: type=1400 audit(1536419529.429:21756): avc: denied { map } for pid=13609 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.380109] audit: type=1400 audit(1536419529.429:21757): avc: denied { map } for pid=13609 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.430087] audit: type=1400 audit(1536419529.459:21758): avc: denied { map } for pid=13609 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.480092] audit: type=1400 audit(1536419529.469:21759): avc: denied { map } for pid=13609 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.520083] audit: type=1400 audit(1536419529.469:21760): avc: denied { map } for pid=13609 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.570102] audit: type=1400 audit(1536419529.469:21761): avc: denied { map } for pid=13609 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2125.620097] audit: type=1400 audit(1536419529.479:21762): avc: denied { map } for pid=13609 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:12:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x803, 0x2000000003) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d0252926285717070") setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000480)=0x10, 0x260) 15:12:14 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'bpq0\x00', 0x103}) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x4001) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f0000000100)="5500000019007f5300fe01b2a4a280930a06ffff00a84302910000003900090008000c00060000f31800150006000640000000dc1320d54400fba4de44220000060cec4fc57feec656ab91d4000000000000000000", 0x55}], 0x1, &(0x7f0000000140)}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f00000001c0)={0xf, 0x1f, 0x1, 0x3}, 0xf) 15:12:14 executing program 6: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f000000c740)={&(0x7f000000c480)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000c600)=[{&(0x7f00000001c0)=""/73, 0x49}], 0x1, &(0x7f000000c640)=""/251, 0xfb}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c780)={0x3, 0x2, &(0x7f0000000080)=@raw=[@map], &(0x7f0000000000)='GPL\x00', 0x0, 0x26, &(0x7f0000000100)=""/38, 0x0, 0x0, [], r2}, 0x48) [ 2130.775955] kauditd_printk_skb: 12 callbacks suppressed [ 2130.775964] audit: type=1400 audit(1536419535.049:21775): avc: denied { map } for pid=13623 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2130.817474] audit: type=1400 audit(1536419535.049:21776): avc: denied { map } for pid=13623 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2130.931368] audit: type=1400 audit(1536419535.089:21777): avc: denied { map } for pid=13623 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:12:15 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0xfffffffffffffff7) r3 = socket(0xa, 0x1, 0x0) getsockname$unix(r0, &(0x7f0000000100), &(0x7f0000000180)=0x6e) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={"6c6f000000000000000000000000ed1f", 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={@loopback, @local, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000240)={@local, @local, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}) [ 2131.040976] audit: type=1400 audit(1536419535.089:21778): avc: denied { map } for pid=13623 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2131.100189] audit: type=1400 audit(1536419535.089:21779): avc: denied { prog_load } for pid=13620 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2131.167427] audit: type=1400 audit(1536419535.109:21780): avc: denied { map } for pid=13623 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2131.232167] audit: type=1400 audit(1536419535.109:21781): avc: denied { map } for pid=13623 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2131.280596] audit: type=1400 audit(1536419535.109:21782): avc: denied { map } for pid=13623 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2131.350106] audit: type=1400 audit(1536419535.119:21783): avc: denied { map } for pid=13621 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2131.390209] audit: type=1400 audit(1536419535.119:21784): avc: denied { map } for pid=13621 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:12:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000000180001000000000000000010010000000c0001000100000000000000"], 0x1}}, 0x0) 15:12:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x5, 0x40, 0x80, 0x1}, 0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000300)=""/121}, 0x18) 15:12:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 15:12:23 executing program 7: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000e4ffc8)={&(0x7f0000beb000)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000580)}, 0x0) [ 2140.722965] kauditd_printk_skb: 32 callbacks suppressed [ 2140.722975] audit: type=1400 audit(1536419544.999:21817): avc: denied { map_create } for pid=13637 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2140.800095] audit: type=1400 audit(1536419545.029:21818): avc: denied { map_read map_write } for pid=13637 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:12:25 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480), 0xc, &(0x7f00000000c0)={&(0x7f0000000640)={0x14, 0x18, 0xfdfffffffffffffd, 0x0, 0x0, {0x7592da16}}, 0x14}}, 0x0) [ 2140.860129] audit: type=1400 audit(1536419545.029:21819): avc: denied { map_create } for pid=13637 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2140.910098] audit: type=1400 audit(1536419545.039:21820): avc: denied { map_read map_write } for pid=13637 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:12:25 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d0252926285717070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x200, 0x4) sendto$inet6(r1, &(0x7f0000000040)="040300000100000000000000c52cf7c21975e697b02f5c566b2b2ff0dac8897c6b11876d886b6621d8d207ccf73f257e55e86eb29406136fcfff0500000000000000c7a67e4b98a35d724459", 0x4c, 0x0, &(0x7f0000000000)={0xa, 0x800, 0x4, @dev}, 0x1c) [ 2140.970977] audit: type=1400 audit(1536419545.229:21821): avc: denied { create } for pid=13641 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2141.080126] audit: type=1400 audit(1536419545.249:21822): avc: denied { create } for pid=13641 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2141.153159] audit: type=1400 audit(1536419545.429:21823): avc: denied { create } for pid=13644 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:12:25 executing program 6: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local}, 0xc) [ 2141.335042] audit: type=1400 audit(1536419545.469:21824): avc: denied { map } for pid=13646 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2141.505620] audit: type=1400 audit(1536419545.469:21825): avc: denied { map } for pid=13646 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2141.529355] audit: type=1400 audit(1536419545.479:21826): avc: denied { create } for pid=13644 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:12:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setxattr(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000140)='trusted.', 0x14, 0x0) 15:12:29 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@ipv4_delroute={0x1c, 0x19, 0x203}, 0x1c}}, 0x0) 15:12:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f0000001700000000f4ff009500000000000000"], &(0x7f0000000200)="73797a6b616c6c65722c493d6c2b78db01beb8234b8301e2918b8b33e703f173263d15127d1c5309a0593d0f6dbe9cd5434619dfff6e61ba74ed3776315503f2d22b3ecd7a62819bc2345afd348344bed224a114267fd4cd1e55f8cf69c16cfffd3a4dc7721aacdfb55e39d507f86531752d2affc30318f5da65be34374a24f6", 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="c76945c46a9e084cb5a5d2a1c61c789043083db1477817a098678d7b5b9c37d7ea56674df6605d793a7ea5bc14229ea8afc11b8477e1b89317135fe920658cfd3818d5d91a3fc4ab670878a76dcf"], 0x1}}, 0x0) 15:12:29 executing program 6: readv(0xffffffffffffffff, &(0x7f0000002480), 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback={0xfffffff5}}}}, 0x108) 15:12:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000040)) [ 2152.970314] kauditd_printk_skb: 43 callbacks suppressed [ 2152.970323] audit: type=1400 audit(1536419557.219:21870): avc: denied { map } for pid=13667 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.040148] audit: type=1400 audit(1536419557.269:21871): avc: denied { map } for pid=13667 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.108081] audit: type=1400 audit(1536419557.279:21872): avc: denied { map } for pid=13667 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.160089] audit: type=1400 audit(1536419557.279:21873): avc: denied { map } for pid=13667 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.210091] audit: type=1400 audit(1536419557.299:21874): avc: denied { map } for pid=13667 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.270097] audit: type=1400 audit(1536419557.299:21875): avc: denied { map } for pid=13667 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.350097] audit: type=1400 audit(1536419557.299:21876): avc: denied { map } for pid=13667 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.420121] audit: type=1400 audit(1536419557.339:21877): avc: denied { map } for pid=13667 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.470074] audit: type=1400 audit(1536419557.339:21878): avc: denied { map } for pid=13667 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.520089] audit: type=1400 audit(1536419557.359:21879): avc: denied { map } for pid=13667 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:12:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40a0000000000103c000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x15, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 15:12:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) bind$inet(r0, &(0x7f0000dc7ff0)={0x2, 0x4e24, @local}, 0x10) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet_group_source_req(r1, 0x0, 0x0, &(0x7f0000000080)={0x55e1, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e24, @remote}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)="6e65742f756470002a5edfb1e2fee862ac9688724dc32c95663b95ba92b15aea79f4ea68c1e0c0d3393f1e72386c8a1e8e5c7ba566b63df5085ae632e1304d7baa744e08603c6f7c75e803eacf0711726cd120522fd1997a83bcc468faa3fe4aca845c659870706dc89f5fbf855ef9ff8eaaa55787cc147401d527fa20f24475b4770ab4d27af4fd98b959db5ba3a7be568a01cc108439d5522be84e2f634ee3d86b535c7472d836772cf99e04f63f04ed08f54f2097d5d8be0f2c838f3534") preadv(r3, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0x7f}], 0x1, 0x102) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000040)={0x1, 0x28, 0x1, r2}) 15:12:44 executing program 6: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000040)={0xc56, 0x0, 0x0, 0x200, 0x0, 0x0, 0x9}, &(0x7f0000000080)={0x0, 0x9684, 0x7978d3fe, 0x100000001, 0x101, 0x3ff}, &(0x7f0000000140)={0x0, 0x7fff, 0xce29, 0x0, 0x4, 0x0, 0x0, 0x8000}, &(0x7f00000001c0), &(0x7f00000002c0)={&(0x7f0000000240), 0x8}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffd, 0x7fff}, 0x2c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) fsync(r1) 15:12:44 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'bpq0\x00', 0x103}) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x4001) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f0000000100)="5500000019007f5300fe01b2a4a280930a06ffff00a84302910000003900090008000c00060000f31800150006000640000000dc1320d54400fba4de44220000060cec4fc57feec656ab91d4000000000000000000", 0x55}], 0x1, &(0x7f0000000140)}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f00000001c0)={0xf, 0x1f, 0x1, 0x3}, 0xf) 15:12:44 executing program 5: r0 = getpid() io_setup(0xb, &(0x7f0000000380)=0x0) ioprio_get$pid(0x3, r0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) io_cancel(r1, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000003c0)}, &(0x7f0000000300)) getpgrp(r2) [ 2160.412307] kauditd_printk_skb: 12 callbacks suppressed [ 2160.412316] audit: type=1400 audit(1536419564.689:21892): avc: denied { map_create } for pid=13672 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 15:12:45 executing program 6: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="45b5e8ef5004096d054a6f44c2ee56ed053d61678648fb2ae46941161713c010bfd1c68d4f008d023698d4df69c38cb9540beeee287fc8ee165f67be705889a8bc852a995fdc5584101d7c308e0e3afe22e04865291da47343363d6eb4017640b5e08bdf652ed9bb715e9ffc362d7d32fd654828453bf0b38080c97689bf2a84c8593055f6f20cd9d09a44a95cdc8d49879714d06d874ee27155ee284e57556dc539c776fe55af0b0b37372fc334d81582f1"], &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) rmdir(&(0x7f0000000240)='./file0//ile0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@dev={0xac, 0x14, 0x14, 0x18}, @in=@loopback, 0x4e22, 0x0, 0x4e22, 0xe000000000000000, 0x0, 0x80, 0x80, 0xff, 0x0, r1}, {0xa, 0x7, 0x0, 0x0, 0x9, 0x6, 0x40000000000000, 0xc1f}, {0x100000001, 0x0, 0x0, 0x8001}, 0x0, 0x6e6bbd, 0x1}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in=@multicast2, 0x3501, 0x2, 0x3, 0x1ff, 0x3ff, 0x0, 0x3}}, 0xe8) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) r2 = dup3(r0, r0, 0x80000) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x10400, 0x0) renameat2(r2, &(0x7f0000000140)='./file0//ile0\x00', r3, &(0x7f0000000200)='./file0\x00', 0x2) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) [ 2160.923988] audit: type=1400 audit(1536419565.199:21893): avc: denied { map_create } for pid=13676 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2161.287530] audit: type=1400 audit(1536419565.559:21894): avc: denied { map } for pid=13682 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2161.364456] audit: type=1400 audit(1536419565.589:21895): avc: denied { map } for pid=13682 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2161.438632] audit: type=1400 audit(1536419565.599:21896): avc: denied { map } for pid=13682 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2161.499314] audit: type=1400 audit(1536419565.609:21897): avc: denied { map } for pid=13682 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2161.551945] audit: type=1400 audit(1536419565.629:21898): avc: denied { map } for pid=13682 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2161.604858] audit: type=1400 audit(1536419565.669:21899): avc: denied { map } for pid=13682 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2161.659911] audit: type=1400 audit(1536419565.669:21900): avc: denied { map } for pid=13682 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:12:46 executing program 6: r0 = socket(0x2000000011, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0xfe69, 0x0, &(0x7f0000000140)={0xa, 0x8864, 0x1, @ipv4={[], [], @multicast2}}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) [ 2161.753609] audit: type=1400 audit(1536419565.679:21901): avc: denied { map } for pid=13682 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:12:55 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) signalfd4(r0, &(0x7f0000000000)={0x2}, 0x8, 0x800) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)={0x4, 0x0, 0x2d1, 0x0, 0x7fffffff}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='net/netstat\x00') getsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000080)=""/22, &(0x7f00000000c0)=0x16) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000100)) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0xa, &(0x7f0000000240)=ANY=[@ANYBLOB="1800a8be592fb9ad5f5d4d00000000000000000000000095006843d5323c29c55a57529c93b35cf3ca9d40f818a9dafebff24d71f88e54653b928a9f9a1317d061bc20c90426f4d20aa12347902b9628f78d0841b85aa0"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 15:12:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000000000000000f70a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000fe80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x190) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=ANY=[], 0x0) 15:12:56 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x0, &(0x7f0000000cc0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) tee(r1, r0, 0x0, 0x6) r2 = dup(r1) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00', r2}, 0x10) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) timer_create(0x7, &(0x7f0000000500)={0x0, 0xf, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000540)=0x0) timer_delete(r4) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$notify(r3, 0x402, 0x1) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/110, 0x6e) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r5, 0x80003) sendfile(r1, r5, &(0x7f00000000c0), 0x8000fffffffe) ioctl$LOOP_GET_STATUS64(r5, 0x4c05, &(0x7f0000000280)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}], 0x1, 0x8000) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f00000003c0)=0x1ff) 15:12:57 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)=0xffffffffffffff7c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x6040, 0x0) sync() getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f00000000c0), &(0x7f0000000040)=0x4) 15:12:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x80, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) epoll_create1(0x7fffc) 15:12:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', @ifru_names='veth0\x00'}) getpgid(0xffffffffffffffff) splice(r0, &(0x7f0000000000)=0x26, r0, &(0x7f0000000040), 0x200, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) [ 2176.939543] kauditd_printk_skb: 25 callbacks suppressed [ 2176.939553] audit: type=1400 audit(1536419581.209:21927): avc: denied { map } for pid=13721 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.028413] audit: type=1400 audit(1536419581.229:21928): avc: denied { map } for pid=13721 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.070132] audit: type=1400 audit(1536419581.229:21929): avc: denied { map } for pid=13721 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.120095] audit: type=1400 audit(1536419581.229:21930): avc: denied { map } for pid=13721 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.177532] audit: type=1400 audit(1536419581.249:21931): avc: denied { map } for pid=13721 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.220118] audit: type=1400 audit(1536419581.249:21932): avc: denied { map } for pid=13721 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.270210] audit: type=1400 audit(1536419581.269:21933): avc: denied { map } for pid=13721 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.320109] audit: type=1400 audit(1536419581.269:21934): avc: denied { map } for pid=13721 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.370091] audit: type=1400 audit(1536419581.269:21935): avc: denied { map } for pid=13721 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2177.420128] audit: type=1400 audit(1536419581.279:21936): avc: denied { map } for pid=13721 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:13:02 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x200, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x8, &(0x7f0000000180)=0x40, 0x4) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000200)=""/48) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r2, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/236) socket$nl_xfrm(0x10, 0x3, 0x6) 15:13:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) ioctl$KDSETLED(r1, 0x4b32, 0x6) setsockopt$inet6_buf(r0, 0x29, 0x80000000000043, &(0x7f0000000180), 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$P9_RRENAMEAT(r3, &(0x7f0000000000)={0x7, 0x4b, 0x2}, 0x7) 15:13:02 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x0) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) clone(0x10000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) 15:13:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) close(r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) write$cgroup_pid(r2, &(0x7f0000000100)=r3, 0x12) r4 = getpid() sched_setscheduler(r4, 0x8, &(0x7f0000000000)=0x10001) recvfrom$unix(r1, &(0x7f0000000380)=""/202, 0xca, 0x0, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0xffffffffffffff0d) 15:13:04 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000013c0)=0x7, 0x4) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000012c0)={0x0, 0xfb, 0xd2, 0x2, 0x9, "c085be8e4920ddee13b56d75e905c792", "1383e0b2148535e72ec4baacf30ea958ad2c01100d0755204d27163925b80f387ff0e414389391b5359c3b1e4dc3bb7c3553dbf74f961f4871028e432e93e3dcc8ae672c67a77f2d4478c597d6569ed827b2e17e28e36da8574f2206c9dd5570ea952fb9b468e6414d7431a2b809ed1feb955f9b49b4973a9e55e9b9d6b513c86dcfb2edda66ccf020b7d3a091c3d0791ee49a341ccd44a6f3c63b5d7a4e9cf7f3cf6164f0af21050c83d360ffcc22a0a2a218aa2223f3de314a5c84ef"}, 0xd2, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x8000, 0xfffffffffffffffc) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001400)='/dev/vga_arbiter\x00', 0x40, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000003440)={r2, &(0x7f0000001440)="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", &(0x7f0000002440)=""/4096}, 0x18) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 15:13:04 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000500)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @loopback}, 0x0, 0x3, 0x4, 0x1}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000000)="03934f", 0x3}, {&(0x7f0000000280)="3b76c2c09bd5f91f05614afa1de28b24272d3c865844817a02f330f0edf35d5cb1128682b06232674d1594a154e6b9ba1a8006bc61dfc59463857e8e6e0da9764a2d9c77ad382334e8d7f93c7de631bd8bb9f76c3a216259a59b71bee4e4f688e6ee323333778f53cc50f11423ef77b5fe4483414a42426e67cdd6136128c7cea193ce464837da8265f57adddd8f4b0ed49965c299813b32f4dcd0340e50fb", 0x9f}, {&(0x7f0000000180)="b5f0d4dfd0e1a741e5b73dd0e5a4fbd10817aec4", 0x14}, {&(0x7f0000000380)="ee0bee3196bf01abce64eb919daef71c2e99cc7f0db49763352565710692718ec65a40e0afd2e9fec0abddefdbadd181c08157e8fe823bd964ad750ec22de77603a0cba36cbc8dfb3c648a909d66e9b7452e9ce165d9b51aef47b33b3467a2a388e5782f54b18154f637620ed1b1405b446ccc841382eb68106bdadec990155078a93a22446da6c25f36efabb2e3ce0268cfeed230fbff644f6afddf34801e5fcd413b5395f9f1ce4a8abdfa8922ef5cdc33459d4da882423bf9263a6db76c20b40c58d39447005dbbcaaedaa91f97f278eb5244", 0xd4}, {&(0x7f00000001c0)="cdc4", 0x2}], 0x5, 0x0, 0x0, 0x4000000}, 0x20000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f00000005c0)) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2180.059695] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2180.072638] F2FS-fs (loop6): Can't find valid F2FS filesystem in 1th superblock [ 2180.093687] attempt to access beyond end of device [ 2180.103915] loop6: rw=12288, want=8200, limit=20 [ 2180.115814] F2FS-fs (loop6): invalid crc value [ 2180.130607] attempt to access beyond end of device [ 2180.144050] loop6: rw=12288, want=12296, limit=20 [ 2180.156029] F2FS-fs (loop6): invalid crc value [ 2180.166443] F2FS-fs (loop6): Failed to get valid F2FS checkpoint [ 2180.180385] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2180.195457] F2FS-fs (loop6): Can't find valid F2FS filesystem in 1th superblock [ 2180.212303] attempt to access beyond end of device [ 2180.222998] loop6: rw=12288, want=8200, limit=20 [ 2180.233642] F2FS-fs (loop6): invalid crc value [ 2180.244104] attempt to access beyond end of device [ 2180.253845] loop6: rw=12288, want=12296, limit=20 [ 2180.264465] F2FS-fs (loop6): invalid crc value [ 2180.274995] F2FS-fs (loop6): Failed to get valid F2FS checkpoint [ 2180.370051] attempt to access beyond end of device [ 2180.376255] loop6: rw=12288, want=8200, limit=20 [ 2180.387505] attempt to access beyond end of device [ 2180.401905] loop6: rw=12288, want=12296, limit=20 [ 2180.414757] attempt to access beyond end of device [ 2180.427209] loop6: rw=12288, want=8200, limit=20 [ 2180.440593] attempt to access beyond end of device [ 2180.451791] loop6: rw=12288, want=12296, limit=20 [ 2186.559412] kauditd_printk_skb: 56 callbacks suppressed [ 2186.559422] audit: type=1400 audit(1536419590.829:21993): avc: denied { map } for pid=13745 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.610096] audit: type=1400 audit(1536419590.849:21994): avc: denied { map } for pid=13745 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.680096] audit: type=1400 audit(1536419590.849:21995): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.740152] audit: type=1400 audit(1536419590.849:21996): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.790098] audit: type=1400 audit(1536419590.889:21997): avc: denied { map } for pid=13745 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.830170] audit: type=1400 audit(1536419590.889:21998): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.930127] audit: type=1400 audit(1536419590.889:21999): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.980097] audit: type=1400 audit(1536419590.919:22000): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2187.100069] audit: type=1400 audit(1536419590.919:22001): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2187.230107] audit: type=1400 audit(1536419590.939:22002): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:13:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001ff) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000180)={0x0, 0x0, 0x1}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000400)=0x3, 0x4) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000140)) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, r3, 0xc, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000000}, 0x5) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, 0xfffffffffffffff9, 0x8001, 0x4, 0x9f8, 0x8, 0x2, 0x3, 0xe3f0, 0x8000, 0x6, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x1f, 0x0, 0xff, 0x6}, 0x0, 0x0, r0, 0x8) 15:13:14 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) write$P9_RGETLOCK(r1, &(0x7f00000000c0)={0x1e, 0x37, 0x1, {0x2, 0x6375, 0x485, r2}}, 0x1e) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpgid(0x0, r3) setpgid(0x0, 0x0) 15:13:14 executing program 6: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000059d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) 15:13:15 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x202102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe2(&(0x7f0000000000), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000100)={'filter\x00'}, 0x3b3) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) mount(&(0x7f0000000240)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000780)='./file0\x00') mkdir(&(0x7f0000000140)='./control\x00', 0x0) inotify_init1(0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x100, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000180)={0xc, 0x22, 0x0, 0x0, 0x0, 0x9, 0x1, 0xb4}) accept$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000280)=0x1c) rename(&(0x7f00000001c0)='./control\x00', &(0x7f00000000c0)='./file1\x00') [ 2193.399668] kauditd_printk_skb: 119 callbacks suppressed [ 2193.399677] audit: type=1400 audit(1536419597.669:22122): avc: denied { map } for pid=13763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.460120] audit: type=1400 audit(1536419597.689:22123): avc: denied { map } for pid=13763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.530114] audit: type=1400 audit(1536419597.689:22124): avc: denied { map } for pid=13763 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.570121] audit: type=1400 audit(1536419597.689:22125): avc: denied { map } for pid=13763 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.640093] audit: type=1400 audit(1536419597.709:22126): avc: denied { map } for pid=13763 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.700130] audit: type=1400 audit(1536419597.709:22127): avc: denied { map } for pid=13763 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.750118] audit: type=1400 audit(1536419597.729:22128): avc: denied { map } for pid=13763 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.800104] audit: type=1400 audit(1536419597.729:22129): avc: denied { map } for pid=13763 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.850095] audit: type=1400 audit(1536419597.729:22130): avc: denied { map } for pid=13763 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2193.890091] audit: type=1400 audit(1536419597.739:22131): avc: denied { map } for pid=13763 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.421738] kauditd_printk_skb: 61 callbacks suppressed [ 2198.421747] audit: type=1400 audit(1536419602.699:22193): avc: denied { map } for pid=13773 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.550137] audit: type=1400 audit(1536419602.729:22194): avc: denied { map } for pid=13767 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.671031] audit: type=1400 audit(1536419602.739:22195): avc: denied { map } for pid=13773 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.753262] audit: type=1400 audit(1536419602.739:22196): avc: denied { map } for pid=13773 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.778721] audit: type=1400 audit(1536419602.769:22197): avc: denied { map } for pid=13767 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.803982] audit: type=1400 audit(1536419602.769:22198): avc: denied { map } for pid=13767 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.840082] audit: type=1400 audit(1536419602.769:22199): avc: denied { map } for pid=13767 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.880101] audit: type=1400 audit(1536419602.789:22200): avc: denied { map } for pid=13771 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.930178] audit: type=1400 audit(1536419602.789:22201): avc: denied { map } for pid=13770 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2198.970090] audit: type=1400 audit(1536419602.789:22202): avc: denied { map } for pid=13771 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:13:26 executing program 7: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000017000), 0x4) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) listen(0xffffffffffffffff, 0x0) 15:13:26 executing program 5: 15:13:26 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000020feffff7a0af0fff8ffffff79a4f0ff00500000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 15:13:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f00000002c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000002200)=[{0x10, 0x1}], 0x10}}], 0x1, 0x54) [ 2209.048577] kauditd_printk_skb: 60 callbacks suppressed [ 2209.048587] audit: type=1400 audit(1536419613.319:22263): avc: denied { map } for pid=13786 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2209.150153] audit: type=1400 audit(1536419613.329:22264): avc: denied { map } for pid=13785 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2209.250142] audit: type=1400 audit(1536419613.329:22265): avc: denied { map } for pid=13785 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2209.350128] audit: type=1400 audit(1536419613.359:22266): avc: denied { map } for pid=13786 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2209.450133] audit: type=1400 audit(1536419613.369:22267): avc: denied { map } for pid=13786 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2209.483451] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2209.483459] audit: audit_lost=143 audit_rate_limit=0 audit_backlog_limit=64 15:13:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)="7374617409c0d2febcf9df2deac8c177ff171248e911938266057de66cf637bdbf1311920c8a84e4dc8f26eda4dcc3783f9db5116b34d31b0400a5608aaff01e79527a2def1800000000a2c51ab7ac037fd2329ceeb2b44fd468e97d42d14b3d123d3aae86c03800000000008e75ab01e8d178fd322315c0b1fa56ba88cff609e7cad8721472ab0f192d06", 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="bf"], 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 2209.483464] audit: backlog limit exceeded [ 2209.485332] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2209.485338] audit: audit_lost=144 audit_rate_limit=0 audit_backlog_limit=64 15:13:33 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2000000003) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 15:13:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001580)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_newneigh={0x28, 0x1c, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, r2, 0xfffffffc}, [@NDA_DST_MAC={0xc, 0x1, @link_local}]}, 0x28}}, 0x0) 15:13:39 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000080), 0x4) 15:13:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x2, 'lo\x00'}, 0x18) 15:13:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x50, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_MAP={0x28}]}, 0x50}}, 0x0) 15:13:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x10000014e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20000000, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r0, &(0x7f0000000080)='p', 0x1, 0x80, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f0000000180)=""/152, 0x98) 15:13:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'bridge_slave_1\x00', @ifru_ivalue}) [ 2216.220925] kauditd_printk_skb: 185 callbacks suppressed [ 2216.220935] audit: type=1400 audit(1536419620.499:22344): avc: denied { map } for pid=13804 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.277062] audit: type=1400 audit(1536419620.499:22345): avc: denied { map } for pid=13804 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.328156] audit: type=1400 audit(1536419620.499:22346): avc: denied { map } for pid=13804 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.379206] audit: type=1400 audit(1536419620.499:22347): avc: denied { map } for pid=13804 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.820760] audit: type=1400 audit(1536419620.529:22348): avc: denied { map } for pid=13804 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.845630] audit: type=1400 audit(1536419620.529:22349): avc: denied { map } for pid=13804 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.872590] audit: type=1400 audit(1536419620.539:22350): avc: denied { map } for pid=13804 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.897800] audit: type=1400 audit(1536419620.549:22351): avc: denied { map } for pid=13804 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.922638] audit: type=1400 audit(1536419620.549:22352): avc: denied { map } for pid=13804 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.947451] audit: type=1400 audit(1536419620.639:22353): avc: denied { map } for pid=13805 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.439832] kauditd_printk_skb: 168 callbacks suppressed [ 2222.439842] audit: type=1400 audit(1536419626.709:22522): avc: denied { map } for pid=13822 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.520117] audit: type=1400 audit(1536419626.769:22523): avc: denied { map } for pid=13822 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.600116] audit: type=1400 audit(1536419626.789:22524): avc: denied { map } for pid=13822 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.660153] audit: type=1400 audit(1536419626.789:22525): avc: denied { map } for pid=13822 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.710204] audit: type=1400 audit(1536419626.789:22526): avc: denied { map } for pid=13822 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.760266] audit: type=1400 audit(1536419626.829:22527): avc: denied { map } for pid=13822 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.810152] audit: type=1400 audit(1536419626.829:22528): avc: denied { map } for pid=13822 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.860277] audit: type=1400 audit(1536419626.849:22529): avc: denied { map } for pid=13822 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.884622] audit: type=1400 audit(1536419626.849:22530): avc: denied { map } for pid=13822 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.909623] audit: type=1400 audit(1536419626.849:22531): avc: denied { map } for pid=13822 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2230.779790] kauditd_printk_skb: 13 callbacks suppressed [ 2230.779798] audit: type=1400 audit(1536419635.049:22545): avc: denied { map } for pid=13824 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2230.880131] audit: type=1400 audit(1536419635.119:22546): avc: denied { map } for pid=13824 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2230.972225] audit: type=1400 audit(1536419635.119:22547): avc: denied { map } for pid=13824 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2231.080122] audit: type=1400 audit(1536419635.119:22548): avc: denied { map } for pid=13824 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2231.200109] audit: type=1400 audit(1536419635.129:22549): avc: denied { map } for pid=13826 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2231.259660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2231.259667] audit: audit_lost=181 audit_rate_limit=0 audit_backlog_limit=64 [ 2231.259672] audit: backlog limit exceeded [ 2231.261196] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2231.261202] audit: audit_lost=182 audit_rate_limit=0 audit_backlog_limit=64 [ 2241.696325] kauditd_printk_skb: 162 callbacks suppressed [ 2241.696334] audit: type=1400 audit(1536419645.969:22636): avc: denied { map } for pid=13834 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790108] audit: type=1400 audit(1536419645.989:22637): avc: denied { map } for pid=13837 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790133] audit: type=1400 audit(1536419646.009:22638): avc: denied { map } for pid=13834 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790155] audit: type=1400 audit(1536419646.009:22639): avc: denied { map } for pid=13834 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790178] audit: type=1400 audit(1536419646.009:22640): avc: denied { map } for pid=13834 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790200] audit: type=1400 audit(1536419646.019:22641): avc: denied { map } for pid=13837 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790224] audit: type=1400 audit(1536419646.019:22642): avc: denied { map } for pid=13836 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790247] audit: type=1400 audit(1536419646.019:22643): avc: denied { map } for pid=13836 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790270] audit: type=1400 audit(1536419646.019:22644): avc: denied { map } for pid=13837 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2241.790292] audit: type=1400 audit(1536419646.019:22645): avc: denied { map } for pid=13837 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:14:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @loopback}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x200000, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000683ff4)={@multicast1, @loopback}, 0xc) dup3(r0, r1, 0x0) dup3(r0, r2, 0x0) 15:14:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) 15:14:09 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="8f7a63abeacaf6dc"], 0x1}, 0x1, 0x0, 0x0, 0x20000805}, 0x0) 15:14:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x2}) 15:14:09 executing program 1: r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=0x1) keyctl$setperm(0x5, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000788000), 0x4) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) setsockopt(r3, 0x0, 0x0, &(0x7f0000001000), 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000680)=""/243, 0xf3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000640)=0xc) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'dummy0\x00', 0x3ff}) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="700c00000000000002004e21ac141412000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001399200000000000000000000000700000002004e20ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) socket(0x10000002, 0x8000000000001, 0x8) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendto$packet(0xffffffffffffffff, &(0x7f0000000780)="f18e82671b73fe1de23b5f09cb83f30c2fe93c18336bb8be0d7e3792fde14dde9a6fceb517077d0a64ea0308c6c3a4c9b77023ebd74ef59238d0915a819f9602ac357155ae10956052", 0x0, 0x2000000000000000, 0x0, 0xfffffffffffffd2a) pwritev(r3, &(0x7f0000000300), 0x100001cf, 0x0) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, r6) ioctl$TIOCGSID(r6, 0x5429, &(0x7f00000002c0)) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f00000003c0)={0x100, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @rand_addr=0x6}, {0x2, 0x4e22, @loopback}, 0x8, 0xfffffffffffff88b, 0x401, 0x7ff, 0x4, &(0x7f0000000240)='gretap0\x00', 0x1ff, 0x10000, 0xfffffffffffffff7}) 15:14:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x20000000004000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r2, 0x3, 0x1, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$TCFLSH(r1, 0x40045431, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 15:14:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) write$binfmt_misc(r2, &(0x7f0000000380)=ANY=[@ANYRES32=r0], 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x7fd) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000100)={0x80000000, {0xfffffffffffffffc, 0x7, 0xa2a0, 0x66cfe8f0, 0x0, 0x1}}) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000140)={0x0, 0x4}) accept$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0xfffffffffffffceb) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 15:14:09 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000600)={0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) getresgid(&(0x7f0000000800)=0x0, &(0x7f0000000840), &(0x7f0000000880)) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000140)="71dde06305eea8054859630d900ce713c16165f91111fec0591cd555064aff0dd4891b3a481ade67f71a265e2852f47b7f549bccf0e6a9938e885ce0bb590b50b10645366f19e04519f4a129f40e598d07ba5c7d2586a8503d46ceb430f0b054321facc28633de1ee2dd61e9b423bb5c09edc14f7bbf071a18845672045e31fab1c83e130b04f5a728434d996db73124a02dff7fa1215dfce93b944177d3ab8a8e7d6eb449064bc47a6e10d514dec0c01d9cc825cbde58f48715caeb2a1cac317ffceece6f25e77cde30a7709a9efcf0890bb55f9a64a5db29e9dcfe03ce0b823193173035f224fd3d42f672", 0xec}, {&(0x7f0000000240)="5192a24d55ca0c2483a2718ef2cfcf47ab5696c0980823b69dfbdc4854da1ec6694a299500f56d4e280f7ade07f627ce9685c14969737b0da563df1fbfde312e40ed14db8867e734c535a23bb0b7975fd5194b6793b1bf518cabc9f4ebf13612be8ac428955ebbd683a0090ecade0a09764a70f408f0dbbc04ec6a43474d0e1ef4ae0270e35c833aedb35f17e994b4fe220369b2cb3a78b80a0196a0956b5c4fba0d63ced25af7feedb62fbcbc64ea4d403a4e27a02063c4e81c53cd5d7fd000107de37f093dfdb9339d3a8927ad672164abef78ee4608d026d04f0dd781c9", 0xdf}, {&(0x7f00000000c0)="b0c52a98670e1da042e750d7f26e616f3aa4865b5dfa4ea40f34ecc0f62afa99e2b51f2421fc0b5e668bbbd7873da4a724aaabb5394e", 0x36}, {&(0x7f0000000340)="1595a7a0d260b565ff23b8a466aec270bc51190f2e56bbf64394fb0afadc2013e02232dfc7f9357d7857556ca7805ab642ece2546470e45ee97e83da2a29e58a4b667a1e9d1235", 0x47}, {&(0x7f00000003c0)="11bf7c3b7e30920ce50723849b6a272d8306c11fdc03179fd7c61dcad8af6a051aef9c1621c2c049914d1cf37ec93cb8fd3beb3207d9bd3f3b882f7e769f35a3b1e30b47925e765bef77ad01c1539a3dec3a3d18e15858b1cabe7854fa96cb4d27c8b3012eea08fe4e2f24332f2aa6063d1c1c9b10fe243e4a69c42a526d3ef4ae4e23e8aa27c21136b2c392f175c4d02f8e0f3760eddc540708160e8e6fba45a7b859e3893851acbf", 0xa9}, {&(0x7f0000000480)="780796fe266fe5767a6f3ca09a98475b416f4a76890e2ed5f8653240b253d2525da4346f489f2144df69e056f016ffb8627056def8a1e524c5fc12e3f03e62f98c4dadae4a796ae4c25128e439c2a5f61231b4b48ba75dcd9b737d1b35c2c9f3a8f6108eccc85c7718c7846c2bab716dad316a1c9bd12fd199ba0b0dc7a55ca38b2118dd802795fff541819f7ac08d09075a52a3a0310120d5438975d79a5e49c9dd32e7620270b71086496892023637c5e9e8f8f9c3bedd22", 0xb9}, {&(0x7f0000000540)="bbd334c2c5ee9fbc29e4cda06c7132560c6d24d336a00d038a7809cffa27e8b8f2498bc7940538796d6758257f4bbc2d6e856dd1f6bf48", 0x37}], 0x7, &(0x7f00000008c0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x40, 0x20000004}, 0x4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x2, 0x81, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000010c0)={r7, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) 15:14:09 executing program 6: io_setup(0x5, &(0x7f0000000100)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400010}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r3, 0x720, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4010}, 0x80c0) fstatfs(r2, &(0x7f0000000340)=""/191) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000140), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000300)="4ad937063ec49f6a6763", 0xa}]) 15:14:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0xfffffffffffffffd, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0xc0fe) 15:14:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) personality(0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000140)=""/172) [ 2248.320558] kauditd_printk_skb: 149 callbacks suppressed [ 2248.320568] audit: type=1400 audit(1536419652.599:22795): avc: denied { map } for pid=13863 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.390093] audit: type=1400 audit(1536419652.629:22796): avc: denied { map } for pid=13863 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.420137] audit: type=1400 audit(1536419652.629:22797): avc: denied { map } for pid=13863 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.511852] audit: type=1400 audit(1536419652.629:22798): avc: denied { map } for pid=13863 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.590135] audit: type=1400 audit(1536419652.649:22799): avc: denied { map } for pid=13863 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.670107] audit: type=1400 audit(1536419652.649:22800): avc: denied { map } for pid=13863 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.740129] audit: type=1400 audit(1536419652.649:22801): avc: denied { map } for pid=13863 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.830133] audit: type=1400 audit(1536419652.699:22802): avc: denied { map } for pid=13863 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.900083] audit: type=1400 audit(1536419652.709:22803): avc: denied { map } for pid=13863 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2248.970106] audit: type=1400 audit(1536419652.709:22804): avc: denied { map } for pid=13863 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:14:17 executing program 7: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x81800400, 0x0, 0x180010000000000}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@setneightbl={0x1c, 0x43, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NDTA_THRESH3={0x8}]}, 0x1c}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='htcp\x00', 0x5) [ 2254.109722] kauditd_printk_skb: 132 callbacks suppressed [ 2254.109731] audit: type=1400 audit(1536419658.379:22937): avc: denied { map } for pid=13873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.180114] audit: type=1400 audit(1536419658.429:22938): avc: denied { map } for pid=13873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.250156] audit: type=1400 audit(1536419658.429:22939): avc: denied { map } for pid=13873 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.300112] audit: type=1400 audit(1536419658.429:22940): avc: denied { map } for pid=13873 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.350148] audit: type=1400 audit(1536419658.449:22941): avc: denied { map } for pid=13873 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.390135] audit: type=1400 audit(1536419658.449:22942): avc: denied { map } for pid=13873 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.460124] audit: type=1400 audit(1536419658.489:22943): avc: denied { map } for pid=13873 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.510134] audit: type=1400 audit(1536419658.489:22944): avc: denied { map } for pid=13873 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.576417] audit: type=1400 audit(1536419658.489:22945): avc: denied { map } for pid=13873 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.620081] audit: type=1400 audit(1536419658.509:22946): avc: denied { map } for pid=13873 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:14:26 executing program 2: memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) 15:14:27 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='/dev/ashmem\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/82) 15:14:27 executing program 5: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) [ 2263.336190] kauditd_printk_skb: 1 callbacks suppressed [ 2263.336198] audit: type=1400 audit(1536419667.609:22948): avc: denied { map } for pid=13878 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2263.470125] audit: type=1400 audit(1536419667.619:22949): avc: denied { map } for pid=13878 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:14:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) write$binfmt_aout(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="a9"], 0x1) ftruncate(r3, 0x208200) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000040)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) futex(&(0x7f0000000ffc), 0x0, 0x0, &(0x7f0000003ff0), &(0x7f0000000000), 0x0) symlinkat(&(0x7f0000008ff8)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, &(0x7f0000d83ff8), 0x8000fffffffe) [ 2263.590319] audit: type=1400 audit(1536419667.619:22950): avc: denied { map } for pid=13878 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2263.700180] audit: type=1400 audit(1536419667.619:22951): avc: denied { map } for pid=13878 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2263.840098] audit: type=1400 audit(1536419667.669:22952): avc: denied { map } for pid=13879 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2263.892438] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2263.892444] audit: audit_lost=208 audit_rate_limit=0 audit_backlog_limit=64 [ 2263.892448] audit: backlog limit exceeded [ 2263.898069] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2263.898075] audit: audit_lost=209 audit_rate_limit=0 audit_backlog_limit=64 [ 2269.609547] kauditd_printk_skb: 184 callbacks suppressed [ 2269.609555] audit: type=1400 audit(1536419673.879:23049): avc: denied { map } for pid=13897 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.660098] audit: type=1400 audit(1536419673.919:23050): avc: denied { map } for pid=13897 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.710090] audit: type=1400 audit(1536419673.929:23051): avc: denied { map } for pid=13897 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.760103] audit: type=1400 audit(1536419673.929:23052): avc: denied { map } for pid=13897 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.810097] audit: type=1400 audit(1536419673.929:23053): avc: denied { map } for pid=13897 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.861101] audit: type=1400 audit(1536419673.949:23054): avc: denied { map } for pid=13897 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.920097] audit: type=1400 audit(1536419673.949:23055): avc: denied { map } for pid=13897 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.970095] audit: type=1400 audit(1536419673.969:23056): avc: denied { map } for pid=13897 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2270.030123] audit: type=1400 audit(1536419673.969:23057): avc: denied { map } for pid=13897 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2270.070416] audit: type=1400 audit(1536419673.989:23058): avc: denied { map } for pid=13897 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:14:38 executing program 0: clone(0x0, &(0x7f0000000380), &(0x7f0000000080), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) 15:14:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087708, &(0x7f0000000000)=""/82) 15:14:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000100)='attr\x00') 15:14:38 executing program 6: syz_emit_ethernet(0x7a, &(0x7f0000000340)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "dab2f1", 0x44, 0x0, 0x0, @dev, @empty, {[], @gre}}}}}, &(0x7f0000000000)={0x0, 0xfffffffffffffffc, [0x10000000, 0x4fb, 0x0, 0xf98]}) 15:14:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000440), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000140012000c000100627269646765000004000210"], 0x1}}, 0x0) 15:14:38 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000240), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv4_newrule={0x44, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, [@FRA_GENERIC_POLICY=@FRA_PROTOCOL={0x8}, @FRA_FLOW={0x8}, @FRA_FLOW={0x8}, @FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x44}}, 0x0) 15:14:38 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @random="a1d307f9965d", [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, &(0x7f0000001780)) [ 2274.631773] kauditd_printk_skb: 21 callbacks suppressed [ 2274.631782] audit: type=1400 audit(1536419678.909:23080): avc: denied { map } for pid=13911 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.750098] audit: type=1400 audit(1536419678.919:23081): avc: denied { map } for pid=13912 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.860119] audit: type=1400 audit(1536419678.919:23082): avc: denied { map } for pid=13912 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.960121] audit: type=1400 audit(1536419678.919:23083): avc: denied { map } for pid=13912 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2275.067784] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2275.067793] audit: audit_lost=239 audit_rate_limit=0 audit_backlog_limit=64 [ 2275.067798] audit: backlog limit exceeded [ 2275.069587] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2275.069593] audit: audit_lost=240 audit_rate_limit=0 audit_backlog_limit=64 [ 2275.069598] audit: backlog limit exceeded 15:14:41 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc8") ftruncate(r3, 0x8200) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) fallocate(r3, 0x10, 0x0, 0xcd55) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080), 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x90}}, 0xe8) sendmsg(r0, &(0x7f0000000100)={0x0, 0x3b0, &(0x7f0000000180)}, 0x0) 15:14:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x0) clone(0x200900, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000540)=ANY=[]}) 15:14:41 executing program 6: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f0000004000), 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000000180), 0x401ffffffe) 15:14:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000440)="6b657972696e6700c10fa8d7f57d684109d3f33a01373640df828aaee100a76faaa61c005e2bf321a5da416dcc7a3e830b21205d5d4a0100000000000000b405d2a8e8c1bc351e576bd1fbe4b5da06003c354a5c75572208f28197508b9a6573d7eed0def628", 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='anon_inodefs\x00', 0x0, &(0x7f0000000340)='lo$\x00') 15:14:44 executing program 7: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000080)=0x2, 0x4) tgkill(r2, r2, 0x2f) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) ioctl$TIOCCBRK(r3, 0x5428) r4 = add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)="1659538489dd0b5ac9c14331a1a57117157911af66e1ded07f3a11edc75a60c11dfb33344b62fbdd45080c66caa6b2d4907a4ca684b032be84561cb8643e42328744c01d79e22c01bc9f443014b816f168cbb61fd3e87ab8626dbebf4068d88d94377db85b92f8e995f958946daef7b60ae65defffc6815a7710a42e803c2a43559848ead656e130da348b3fbb06758c0b5a", 0x92, r4) fchmodat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 2280.315667] kauditd_printk_skb: 169 callbacks suppressed [ 2280.315675] audit: type=1400 audit(1536419684.589:23202): avc: denied { map } for pid=13939 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.370092] audit: type=1400 audit(1536419684.629:23203): avc: denied { map } for pid=13939 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.410119] audit: type=1400 audit(1536419684.629:23204): avc: denied { map } for pid=13939 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.460101] audit: type=1400 audit(1536419684.629:23205): avc: denied { map } for pid=13939 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.510100] audit: type=1400 audit(1536419684.649:23206): avc: denied { map } for pid=13939 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.560117] audit: type=1400 audit(1536419684.669:23207): avc: denied { map } for pid=13939 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.620090] audit: type=1400 audit(1536419684.669:23208): avc: denied { map } for pid=13939 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.670088] audit: type=1400 audit(1536419684.669:23209): avc: denied { map } for pid=13939 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.720111] audit: type=1400 audit(1536419684.689:23210): avc: denied { map } for pid=13939 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.790106] audit: type=1400 audit(1536419684.689:23211): avc: denied { map } for pid=13939 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.379313] kauditd_printk_skb: 10 callbacks suppressed [ 2285.379322] audit: type=1400 audit(1536419689.649:23222): avc: denied { map } for pid=13940 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.450148] audit: type=1400 audit(1536419689.699:23223): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.540142] audit: type=1400 audit(1536419689.719:23224): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.566681] audit: type=1400 audit(1536419689.719:23225): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.566704] audit: type=1400 audit(1536419689.719:23226): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.566726] audit: type=1400 audit(1536419689.769:23227): avc: denied { map } for pid=13940 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.566749] audit: type=1400 audit(1536419689.789:23228): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.566783] audit: type=1400 audit(1536419689.789:23229): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.566817] audit: type=1400 audit(1536419689.809:23230): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.566837] audit: type=1400 audit(1536419689.809:23231): avc: denied { map } for pid=13940 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.179690] kauditd_printk_skb: 111 callbacks suppressed [ 2292.179699] audit: type=1400 audit(1536419696.449:23343): avc: denied { map } for pid=13948 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.250123] audit: type=1400 audit(1536419696.499:23344): avc: denied { map } for pid=13948 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.320095] audit: type=1400 audit(1536419696.499:23345): avc: denied { map } for pid=13948 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.390125] audit: type=1400 audit(1536419696.499:23346): avc: denied { map } for pid=13948 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.440117] audit: type=1400 audit(1536419696.519:23347): avc: denied { map } for pid=13948 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.490131] audit: type=1400 audit(1536419696.519:23348): avc: denied { map } for pid=13948 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.540129] audit: type=1400 audit(1536419696.519:23349): avc: denied { map } for pid=13948 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.590122] audit: type=1400 audit(1536419696.559:23350): avc: denied { map } for pid=13948 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.640151] audit: type=1400 audit(1536419696.559:23351): avc: denied { map } for pid=13948 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.690186] audit: type=1400 audit(1536419696.579:23352): avc: denied { map } for pid=13948 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:14:57 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, 0xfffffffffffffffd) 15:14:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0a5c2d0252926285717070") r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00', 0xfffffffffffffffb}) write(r0, &(0x7f00000001c0), 0x0) 15:14:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x81800400, 0x0, 0x180010000000000}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@setneightbl={0x1c, 0x43, 0x100, 0x0, 0x25dfdbfb, {}, [@NDTA_THRESH3={0x8}]}, 0x1c}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='htcp\x00', 0x5) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000001c0)=""/184) 15:14:57 executing program 6: INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes 15:15:08 executing program 0: 15:15:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}, 'syz_tun\x00'}) socket(0x1b, 0xf, 0x0) 15:15:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, &(0x7f00000001c0), 0x396, 0x0, &(0x7f000083b000), 0x10) connect(r1, &(0x7f0000000100)=@nl=@unspec, 0x80) 15:15:08 executing program 6: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 15:15:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000700)={'eql\x00', @ifru_flags=0x1}) 15:15:11 executing program 4: 15:15:11 executing program 5: 15:15:11 executing program 7: 15:15:11 executing program 5: 15:15:11 executing program 5: 15:15:11 executing program 5: 15:15:12 executing program 5: 15:15:12 executing program 5: r0 = socket(0x1000100000010, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) write(r0, &(0x7f00000000c0)="1f0000001e0007f1fff5ff0200000000000000005307a33d6c390836be381b", 0x1f) 15:15:12 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="a29ab0893fde", [], {@ipv6={0x86dd, {0x0, 0x6, '?:T', 0x14, 0x2f, 0x0, @remote, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) [ 2310.087819] kauditd_printk_skb: 12 callbacks suppressed [ 2310.087828] audit: type=1400 audit(1536419714.359:23365): avc: denied { map } for pid=13977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.160134] audit: type=1400 audit(1536419714.409:23366): avc: denied { map } for pid=13977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.230133] audit: type=1400 audit(1536419714.409:23367): avc: denied { map } for pid=13977 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.300120] audit: type=1400 audit(1536419714.409:23368): avc: denied { map } for pid=13977 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.370219] audit: type=1400 audit(1536419714.429:23369): avc: denied { map } for pid=13977 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.450223] audit: type=1400 audit(1536419714.429:23370): avc: denied { map } for pid=13977 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.500163] audit: type=1400 audit(1536419714.469:23371): avc: denied { map } for pid=13977 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.550174] audit: type=1400 audit(1536419714.469:23372): avc: denied { map } for pid=13977 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.600148] audit: type=1400 audit(1536419714.479:23373): avc: denied { map } for pid=13977 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2310.650134] audit: type=1400 audit(1536419714.499:23374): avc: denied { map } for pid=13977 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:15:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xf0ffff, 0xf}}, 0x1c}}, 0x0) 15:15:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0x6) [ 2315.940132] kauditd_printk_skb: 1 callbacks suppressed [ 2315.940142] audit: type=1400 audit(1536419720.199:23376): avc: denied { map } for pid=13979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.030130] audit: type=1400 audit(1536419720.249:23377): avc: denied { map } for pid=13979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.110990] audit: type=1400 audit(1536419720.259:23378): avc: denied { map } for pid=13979 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.190232] audit: type=1400 audit(1536419720.259:23379): avc: denied { map } for pid=13979 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.260150] audit: type=1400 audit(1536419720.279:23380): avc: denied { map } for pid=13979 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.320183] audit: type=1400 audit(1536419720.279:23381): avc: denied { map } for pid=13979 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.380167] audit: type=1400 audit(1536419720.299:23382): avc: denied { map } for pid=13981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.430186] audit: type=1400 audit(1536419720.299:23383): avc: denied { map } for pid=13981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.480149] audit: type=1400 audit(1536419720.309:23384): avc: denied { map } for pid=13981 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.530126] audit: type=1400 audit(1536419720.309:23385): avc: denied { map } for pid=13981 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:15:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/current\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) write$9p(r0, &(0x7f0000000180), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x14}, 0x14}}, 0x0) 15:15:38 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000100)=@can, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000c80)=""/4096, 0xffffffe4}], 0x1}, 0x0) 15:15:38 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 15:15:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="ffff9e000a000200aaaaaaaaf8ff00008fefbd073997f3b946ee68abbc672c5238391bb4eb3d22614b57e5415f0ae2adbfeae81d71d1533999af0ebabb115b23a97a90c21e207ec51a1fcd1f15e62641e8c5ea7b7fd6c53a79955c74614159d34f7f5d86bf5204e5540b94337dbcd5f7cde20b5ca956818cb2011a46f38b876947b2b682a2e8dcfb1ebfac0334e27aa19ecab396e68a292b6aed973369f0d8fe2672b511294f1c56e8c1517102556f11dcd7d8e846df0ca10a5b19043705d65dae78a7b4aa2baac1a97abf0eb92b4351e098c84f086428a0c680b598d69ddebbc4554438e92e6af12eae408cf381394b0993bd5f87fa00000000000000000000000000000000"], 0x1}}, 0x0) 15:15:38 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x42, 0x400000000249e1c, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000240)={'veth0_to_bond\x00', 0x100}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/70}, 0x18) [ 2334.236633] kauditd_printk_skb: 22 callbacks suppressed [ 2334.236643] audit: type=1400 audit(1536419738.509:23408): avc: denied { prog_load } for pid=13989 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2334.324971] audit: type=1400 audit(1536419738.569:23409): avc: denied { prog_run } for pid=13989 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2334.440240] audit: type=1400 audit(1536419738.579:23410): avc: denied { prog_load } for pid=13989 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2334.547408] audit: type=1400 audit(1536419738.579:23411): avc: denied { map } for pid=13993 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:15:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_newrule={0x20}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@setlink={0x28, 0x13, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x2}]}]}, 0x28}}, 0x0) 15:15:38 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x8100, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'bond0\x00', 'team0\x00', 'bond0\x00', 'veth1_to_bridge\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}]}, 0x278) 15:15:38 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001c00fdff0000000000004e2c01000000"], 0x1}}, 0x0) 15:15:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6gretap0\x00'}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000180012001000010069703665726574617000000004000200acd7df91aad29e0f67cb67e8a9813f5f6f545c1ff6694367d9f648ea1e0f7ac287438e5ec8aa11c155ca203afa63c28c5144c4d4041beaa8267f3b40bab46e963678e30bc63a32b2b03d0faa5a922ebbf314a36a69a1b4eeb66b865b4ffb39eb9f96218ffe464c1de2284ffc470c8f7def7492a852251830a548cc1871279de20a07ef1f5a670f43948400043dcd0e703cc9ce9a25f6e744ef99f2f4daf89aedf36ccf"], 0x1}}, 0x0) [ 2334.620112] audit: type=1400 audit(1536419738.579:23412): avc: denied { map } for pid=13993 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2334.690152] audit: type=1400 audit(1536419738.589:23413): avc: denied { prog_run } for pid=13989 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2334.758039] audit: type=1400 audit(1536419738.589:23414): avc: denied { map } for pid=13993 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2334.864870] audit: type=1400 audit(1536419738.599:23415): avc: denied { map } for pid=13993 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:15:39 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) clone(0x200900, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000540)=ANY=[]}) [ 2334.945241] audit: type=1400 audit(1536419738.609:23416): avc: denied { map } for pid=13993 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2335.060097] audit: type=1400 audit(1536419738.629:23417): avc: denied { map } for pid=13993 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:15:39 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d0252926285717070") unshare(0x24020400) 15:15:41 executing program 6: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='romfs\x00', 0x1000, &(0x7f00000001c0)) socket$inet6(0xa, 0x803, 0x2000000003) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) 15:15:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000100), &(0x7f0000000840)=""/4096}, 0x18) 15:15:42 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='romfs\x00', 0x1000, &(0x7f00000001c0)) socket$inet6(0xa, 0x0, 0x0) 15:15:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, r0+10000000}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x14, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$poke(0x2, r1, &(0x7f00000001c0), 0x80000000000004) 15:15:43 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x8100, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0xd0, 0xd0, 0x100, [@vlan={'vlan\x00', 0x8, {{0x0, 0x0, 0x892f}}}, @connlabel={'connlabel\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'bond0\x00', 'team0\x00', 'bond0\x00', 'veth1_to_bridge\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}]}, 0x2a8) [ 2339.703536] kauditd_printk_skb: 120 callbacks suppressed [ 2339.703545] audit: type=1400 audit(1536419743.979:23538): avc: denied { map } for pid=14041 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.780139] audit: type=1400 audit(1536419744.019:23539): avc: denied { map } for pid=14041 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.830155] audit: type=1400 audit(1536419744.019:23540): avc: denied { map } for pid=14041 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.880153] audit: type=1400 audit(1536419744.019:23541): avc: denied { map } for pid=14041 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.930926] audit: type=1400 audit(1536419744.039:23542): avc: denied { map } for pid=14041 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.970176] audit: type=1400 audit(1536419744.039:23543): avc: denied { map } for pid=14041 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2340.020151] audit: type=1400 audit(1536419744.039:23544): avc: denied { map } for pid=14041 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2340.090186] audit: type=1400 audit(1536419744.069:23545): avc: denied { map } for pid=14041 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2340.140164] audit: type=1400 audit(1536419744.069:23546): avc: denied { map } for pid=14041 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2340.190139] audit: type=1400 audit(1536419744.089:23547): avc: denied { map } for pid=14041 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.410079] kauditd_printk_skb: 23 callbacks suppressed [ 2347.410088] audit: type=1400 audit(1536419751.679:23571): avc: denied { map } for pid=14045 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.510158] audit: type=1400 audit(1536419751.749:23572): avc: denied { map } for pid=14045 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.560143] audit: type=1400 audit(1536419751.749:23573): avc: denied { map } for pid=14045 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.610158] audit: type=1400 audit(1536419751.749:23574): avc: denied { map } for pid=14045 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.660158] audit: type=1400 audit(1536419751.769:23575): avc: denied { map } for pid=14045 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.700188] audit: type=1400 audit(1536419751.769:23576): avc: denied { map } for pid=14045 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.760230] audit: type=1400 audit(1536419751.769:23577): avc: denied { map } for pid=14045 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.810172] audit: type=1400 audit(1536419751.789:23578): avc: denied { map } for pid=14045 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.860167] audit: type=1400 audit(1536419751.789:23579): avc: denied { map } for pid=14045 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.910187] audit: type=1400 audit(1536419751.809:23580): avc: denied { map } for pid=14045 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:08 executing program 0: 15:16:08 executing program 4: 15:16:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x5, 0x40, 0x80, 0x1}, 0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000300)=""/121}, 0x18) 15:16:08 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd2d}, 0x14}, 0x1, 0x0, 0x0, 0xd0}, 0x10) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$KDSETLED(r2, 0x890b, 0x407000) 15:16:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x18, 0xfffffffffffffffd, 0x0, 0x0, {0x1f}}, 0x14}}, 0x0) 15:16:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="580000001400193440834b80043f679a10ff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200100000010000100090a000000000000000000000000000000", 0x58}], 0x1) [ 2364.325711] kauditd_printk_skb: 1 callbacks suppressed [ 2364.325721] audit: type=1400 audit(1536419768.599:23582): avc: denied { map_create } for pid=14053 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2364.377805] audit: type=1400 audit(1536419768.629:23583): avc: denied { map_read map_write } for pid=14053 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2364.426297] audit: type=1400 audit(1536419768.639:23584): avc: denied { map_create } for pid=14053 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2364.484551] audit: type=1400 audit(1536419768.649:23585): avc: denied { map_read map_write } for pid=14053 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2365.127422] audit: type=1400 audit(1536419769.399:23586): avc: denied { map } for pid=14063 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2365.170114] audit: type=1400 audit(1536419769.399:23587): avc: denied { map } for pid=14063 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2365.210100] audit: type=1400 audit(1536419769.419:23588): avc: denied { map } for pid=14063 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2365.290179] audit: type=1400 audit(1536419769.419:23589): avc: denied { map } for pid=14063 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2365.340116] audit: type=1400 audit(1536419769.439:23590): avc: denied { map } for pid=14063 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2365.400105] audit: type=1400 audit(1536419769.439:23591): avc: denied { map } for pid=14063 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:12 executing program 3: 15:16:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000003e40)={&(0x7f0000000180), 0xc, &(0x7f0000003dc0)=[{&(0x7f0000000600)=ANY=[@ANYBLOB="100000001ff6ff0025bd7000fd39ac03"], 0x1}], 0x1, 0x0, 0x0, 0x10}, 0x24008000) 15:16:12 executing program 6: 15:16:12 executing program 5: 15:16:12 executing program 6: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000040)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r1, &(0x7f00000003c0)="04", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sched_setscheduler(r0, 0x5, &(0x7f0000000200)) uname(&(0x7f0000000000)=""/49) 15:16:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000480)={0x11, 0x1f, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) 15:16:13 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getsockname$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) sched_setscheduler(0x0, 0x1, &(0x7f0000000140)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)={@multicast1, @loopback, 0xffffffffffffffff}, 0x10) [ 2369.332983] kauditd_printk_skb: 105 callbacks suppressed [ 2369.332993] audit: type=1400 audit(1536419773.609:23697): avc: denied { map } for pid=14089 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2369.388138] audit: type=1400 audit(1536419773.619:23698): avc: denied { map } for pid=14089 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2369.441258] audit: type=1400 audit(1536419773.619:23699): avc: denied { map } for pid=14089 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2369.655990] audit: type=1400 audit(1536419773.639:23700): avc: denied { map } for pid=14089 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2369.703803] audit: type=1400 audit(1536419773.639:23701): avc: denied { map } for pid=14089 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2369.753767] audit: type=1400 audit(1536419773.659:23702): avc: denied { map } for pid=14089 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2369.874341] audit: type=1400 audit(1536419773.659:23703): avc: denied { map } for pid=14089 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:14 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x111, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0) [ 2370.131630] audit: type=1400 audit(1536419774.409:23704): avc: denied { map } for pid=14094 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:14 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000080), 0x4) tgkill(r2, 0x0, 0x2f) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) fchmodat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) [ 2370.193400] audit: type=1400 audit(1536419774.439:23705): avc: denied { map } for pid=14094 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2370.280102] audit: type=1400 audit(1536419774.439:23706): avc: denied { map } for pid=14094 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:15 executing program 6: r0 = gettid() exit(0x0) sched_getparam(r0, &(0x7f0000000040)) [ 2375.675274] kauditd_printk_skb: 41 callbacks suppressed [ 2375.675284] audit: type=1400 audit(1536419779.949:23748): avc: denied { map } for pid=14111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2375.750106] audit: type=1400 audit(1536419779.949:23749): avc: denied { map } for pid=14111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2375.820100] audit: type=1400 audit(1536419779.959:23750): avc: denied { map } for pid=14111 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2375.890114] audit: type=1400 audit(1536419779.959:23751): avc: denied { map } for pid=14111 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2375.950097] audit: type=1400 audit(1536419779.959:23752): avc: denied { map } for pid=14111 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2376.000103] audit: type=1400 audit(1536419779.979:23753): avc: denied { map } for pid=14111 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2376.050102] audit: type=1400 audit(1536419779.979:23754): avc: denied { map } for pid=14111 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2376.100130] audit: type=1400 audit(1536419779.999:23755): avc: denied { map } for pid=14111 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2376.150121] audit: type=1400 audit(1536419779.999:23756): avc: denied { map } for pid=14111 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2376.200138] audit: type=1400 audit(1536419780.019:23757): avc: denied { map } for pid=14111 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:32 executing program 0: 15:16:32 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$KDSETLED(r2, 0x890b, 0x407000) 15:16:32 executing program 7: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040)=0x2, 0x4) 15:16:32 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'syz_tun\x00', @remote}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x2, 0x7ff, 0x7, 0x101, 0x0, 0xffff, 0x20280, 0x4, 0x40, 0x3, 0x100000001, 0xa1, 0xb387, 0x1f, 0x0, 0x0, 0x80, 0x54, 0x1, 0x1, 0x200400, 0x7, 0x0, 0x6, 0x721a, 0xbcb, 0x8, 0x5, 0x9, 0x0, 0x9, 0x6, 0x6, 0xf2, 0x7, 0x8, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x400, 0x4, 0x5, 0x4, 0x3ff, 0x5, 0x64}) 15:16:32 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x856, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x0, 0xffffffff, &(0x7f0000000380)) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="24000000220007031dfffd946f610500000000000000fd21fe1c4095421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 15:16:32 executing program 2: [ 2388.750100] kauditd_printk_skb: 1 callbacks suppressed [ 2388.750108] audit: type=1400 audit(1536419793.019:23759): avc: denied { map } for pid=14125 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.800127] audit: type=1400 audit(1536419793.039:23760): avc: denied { map } for pid=14125 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.860140] audit: type=1400 audit(1536419793.039:23761): avc: denied { map } for pid=14125 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.900137] audit: type=1400 audit(1536419793.039:23762): avc: denied { map } for pid=14125 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.951296] audit: type=1400 audit(1536419793.059:23763): avc: denied { map } for pid=14125 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2389.010147] audit: type=1400 audit(1536419793.059:23764): avc: denied { map } for pid=14125 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2389.070128] audit: type=1400 audit(1536419793.079:23765): avc: denied { map } for pid=14125 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2389.120155] audit: type=1400 audit(1536419793.079:23766): avc: denied { map } for pid=14125 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2389.160207] audit: type=1400 audit(1536419793.079:23767): avc: denied { map } for pid=14125 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2389.210229] audit: type=1400 audit(1536419793.099:23768): avc: denied { map } for pid=14125 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local}, {{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x16c}}, 0x0) 15:16:41 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x80440, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x952b}) 15:16:41 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000000)=ANY=[@ANYBLOB='/']) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x0) 15:16:41 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$KDSETLED(r2, 0x890b, 0x407000) 15:16:41 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) 15:16:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$KDSETLED(r2, 0x890c, 0x407000) 15:16:42 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$KDSETLED(r2, 0x890b, 0x407000) [ 2398.883771] kauditd_printk_skb: 12 callbacks suppressed [ 2398.883781] audit: type=1400 audit(1536419803.159:23781): avc: denied { map } for pid=14140 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2398.971986] audit: type=1400 audit(1536419803.189:23782): avc: denied { map } for pid=14140 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2399.019769] audit: type=1400 audit(1536419803.209:23783): avc: denied { map } for pid=14140 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2399.091240] audit: type=1400 audit(1536419803.209:23784): avc: denied { map } for pid=14140 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2399.144385] audit: type=1400 audit(1536419803.229:23785): avc: denied { map } for pid=14140 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:43 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_ifreq(r0, 0x20000008922, &(0x7f0000000000)={'syz_tun\x00', @ifru_addrs=@in={0x2, 0x4e24, @multicast2}}) [ 2399.193307] audit: type=1400 audit(1536419803.239:23786): avc: denied { map } for pid=14140 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2399.246114] audit: type=1400 audit(1536419803.239:23787): avc: denied { map } for pid=14140 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2399.300213] audit: type=1400 audit(1536419803.279:23788): avc: denied { map } for pid=14140 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:43 executing program 5: [ 2399.352792] syz_tun: Invalid MTU 609091586 requested, hw max 65521 [ 2399.380432] audit: type=1400 audit(1536419803.279:23789): avc: denied { map } for pid=14140 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2399.433703] audit: type=1400 audit(1536419803.299:23790): avc: denied { map } for pid=14140 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:16:43 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$KDSETLED(r2, 0x890b, 0x407000) [ 2406.159416] kauditd_printk_skb: 23 callbacks suppressed [ 2406.159426] audit: type=1400 audit(1536419810.429:23814): avc: denied { map } for pid=14154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.230102] audit: type=1400 audit(1536419810.459:23815): avc: denied { map } for pid=14154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.320208] audit: type=1400 audit(1536419810.459:23816): avc: denied { map } for pid=14154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.360183] audit: type=1400 audit(1536419810.459:23817): avc: denied { map } for pid=14154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.440143] audit: type=1400 audit(1536419810.479:23818): avc: denied { map } for pid=14154 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.500206] audit: type=1400 audit(1536419810.479:23819): avc: denied { map } for pid=14154 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.550130] audit: type=1400 audit(1536419810.479:23820): avc: denied { map } for pid=14154 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.600101] audit: type=1400 audit(1536419810.509:23821): avc: denied { map } for pid=14154 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.650093] audit: type=1400 audit(1536419810.509:23822): avc: denied { map } for pid=14154 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.700129] audit: type=1400 audit(1536419810.529:23823): avc: denied { map } for pid=14154 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2414.879362] kauditd_printk_skb: 1 callbacks suppressed [ 2414.879372] audit: type=1400 audit(1536419819.149:23825): avc: denied { map } for pid=14156 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2414.950101] audit: type=1400 audit(1536419819.199:23826): avc: denied { map } for pid=14156 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2414.999830] audit: type=1400 audit(1536419819.199:23827): avc: denied { map } for pid=14156 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.025291] audit: type=1400 audit(1536419819.199:23828): avc: denied { map } for pid=14156 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.060142] audit: type=1400 audit(1536419819.219:23829): avc: denied { map } for pid=14156 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.100107] audit: type=1400 audit(1536419819.219:23830): avc: denied { map } for pid=14156 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.150113] audit: type=1400 audit(1536419819.219:23831): avc: denied { map } for pid=14156 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.193780] audit: type=1400 audit(1536419819.259:23832): avc: denied { map } for pid=14156 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.219308] audit: type=1400 audit(1536419819.259:23833): avc: denied { map } for pid=14156 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.243774] audit: type=1400 audit(1536419819.259:23834): avc: denied { map } for pid=14156 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:01 executing program 0: 15:17:01 executing program 6: 15:17:01 executing program 5: 15:17:01 executing program 4: 15:17:01 executing program 2: 15:17:01 executing program 6: 15:17:09 executing program 3: 15:17:15 executing program 1: 15:17:15 executing program 5: 15:17:15 executing program 6: 15:17:15 executing program 7: 15:17:15 executing program 6: 15:17:15 executing program 5: 15:17:16 executing program 5: 15:17:16 executing program 6: [ 2431.800755] kauditd_printk_skb: 42 callbacks suppressed [ 2431.800765] audit: type=1400 audit(1536419836.079:23877): avc: denied { map } for pid=14173 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2431.900140] audit: type=1400 audit(1536419836.109:23878): avc: denied { map } for pid=14173 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'lo\x00'}, 0x18) [ 2431.980158] audit: type=1400 audit(1536419836.109:23879): avc: denied { map } for pid=14173 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2432.060124] audit: type=1400 audit(1536419836.109:23880): avc: denied { map } for pid=14173 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2432.170200] audit: type=1400 audit(1536419836.169:23881): avc: denied { map } for pid=14173 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2432.235967] audit: type=1400 audit(1536419836.169:23882): avc: denied { map } for pid=14173 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2432.273759] audit: type=1400 audit(1536419836.169:23883): avc: denied { map } for pid=14173 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2432.324609] audit: type=1400 audit(1536419836.219:23884): avc: denied { map } for pid=14173 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2432.386779] audit: type=1400 audit(1536419836.219:23885): avc: denied { map } for pid=14173 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2432.480102] audit: type=1400 audit(1536419836.239:23886): avc: denied { map } for pid=14173 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2436.840960] kauditd_printk_skb: 12 callbacks suppressed [ 2436.840970] audit: type=1400 audit(1536419841.119:23899): avc: denied { map } for pid=14184 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2436.910137] audit: type=1400 audit(1536419841.119:23900): avc: denied { map } for pid=14184 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2436.970154] audit: type=1400 audit(1536419841.119:23901): avc: denied { map } for pid=14184 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2437.020084] audit: type=1400 audit(1536419841.119:23902): avc: denied { map } for pid=14184 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2437.070281] audit: type=1400 audit(1536419841.119:23903): avc: denied { map } for pid=14184 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2437.130125] audit: type=1400 audit(1536419841.149:23904): avc: denied { map } for pid=14184 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2437.210119] audit: type=1400 audit(1536419841.159:23905): avc: denied { map } for pid=14184 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2437.260103] audit: type=1400 audit(1536419841.159:23906): avc: denied { map } for pid=14184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2437.320122] audit: type=1400 audit(1536419841.159:23907): avc: denied { map } for pid=14184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2437.370093] audit: type=1400 audit(1536419841.179:23908): avc: denied { map } for pid=14184 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/current\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) write$9p(r0, &(0x7f0000000180), 0x0) 15:17:28 executing program 6: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000080), 0x4) 15:17:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) 15:17:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @multicast2}, 0x8) 15:17:28 executing program 4: eventfd2(0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') sendfile(r0, r1, &(0x7f0000000100), 0x80000001) 15:17:28 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) [ 2444.179520] kauditd_printk_skb: 23 callbacks suppressed [ 2444.179529] audit: type=1400 audit(1536419848.449:23932): avc: denied { map } for pid=14195 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.250139] audit: type=1400 audit(1536419848.499:23933): avc: denied { map } for pid=14195 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.300113] audit: type=1400 audit(1536419848.499:23934): avc: denied { map } for pid=14195 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.360958] audit: type=1400 audit(1536419848.499:23935): avc: denied { map } for pid=14195 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.410110] audit: type=1400 audit(1536419848.519:23936): avc: denied { map } for pid=14195 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.460116] audit: type=1400 audit(1536419848.519:23937): avc: denied { map } for pid=14195 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.510117] audit: type=1400 audit(1536419848.519:23938): avc: denied { map } for pid=14195 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.560128] audit: type=1400 audit(1536419848.539:23939): avc: denied { map } for pid=14195 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.610120] audit: type=1400 audit(1536419848.539:23940): avc: denied { map } for pid=14195 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.636714] audit: type=1400 audit(1536419848.559:23941): avc: denied { map } for pid=14195 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:32 executing program 3: 15:17:38 executing program 1: 15:17:38 executing program 7: 15:17:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) linkat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x400) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x80440, 0x0) 15:17:38 executing program 6: 15:17:38 executing program 6: 15:17:38 executing program 5: 15:17:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) fchdir(r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x80440, 0x0) [ 2454.116614] kauditd_printk_skb: 1 callbacks suppressed [ 2454.116624] audit: type=1400 audit(1536419858.389:23943): avc: denied { map } for pid=14202 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.175863] audit: type=1400 audit(1536419858.399:23944): avc: denied { map } for pid=14202 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:38 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000080), 0x4) tgkill(0x0, r1, 0x2f) [ 2454.223601] audit: type=1400 audit(1536419858.399:23945): avc: denied { map } for pid=14202 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.317004] audit: type=1400 audit(1536419858.409:23946): avc: denied { map } for pid=14202 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.378354] audit: type=1400 audit(1536419858.419:23947): avc: denied { map } for pid=14202 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.452151] audit: type=1400 audit(1536419858.459:23948): avc: denied { map } for pid=14202 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.508079] audit: type=1400 audit(1536419858.459:23949): avc: denied { map } for pid=14202 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.562488] audit: type=1400 audit(1536419858.459:23950): avc: denied { map } for pid=14202 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.617030] audit: type=1400 audit(1536419858.499:23951): avc: denied { map } for pid=14202 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.656187] FAT-fs (loop6): codepage cp437 not found [ 2454.687589] audit: type=1400 audit(1536419858.499:23952): avc: denied { map } for pid=14202 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2454.792336] FAT-fs (loop6): codepage cp437 not found 15:17:39 executing program 6: [ 2463.830175] kauditd_printk_skb: 74 callbacks suppressed [ 2463.830185] audit: type=1400 audit(1536419868.079:24027): avc: denied { map } for pid=14224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2463.910108] audit: type=1400 audit(1536419868.139:24028): avc: denied { map } for pid=14224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2463.960106] audit: type=1400 audit(1536419868.139:24029): avc: denied { map } for pid=14224 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.070122] audit: type=1400 audit(1536419868.139:24030): avc: denied { map } for pid=14224 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.120117] audit: type=1400 audit(1536419868.169:24031): avc: denied { map } for pid=14224 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.180108] audit: type=1400 audit(1536419868.169:24032): avc: denied { map } for pid=14224 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.250129] audit: type=1400 audit(1536419868.169:24033): avc: denied { map } for pid=14224 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.274880] audit: type=1400 audit(1536419868.199:24034): avc: denied { map } for pid=14224 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.299088] audit: type=1400 audit(1536419868.199:24035): avc: denied { map } for pid=14224 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.323237] audit: type=1400 audit(1536419868.229:24036): avc: denied { map } for pid=14224 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:55 executing program 0: 15:17:55 executing program 4: 15:17:55 executing program 6: 15:17:55 executing program 5: 15:17:55 executing program 3: 15:17:55 executing program 2: 15:17:55 executing program 7: [ 2471.249329] kauditd_printk_skb: 12 callbacks suppressed [ 2471.249339] audit: type=1400 audit(1536419875.519:24049): avc: denied { map } for pid=14240 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.300162] audit: type=1400 audit(1536419875.539:24050): avc: denied { map } for pid=14240 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.350096] audit: type=1400 audit(1536419875.539:24051): avc: denied { map } for pid=14240 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.400096] audit: type=1400 audit(1536419875.539:24052): avc: denied { map } for pid=14240 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.451187] audit: type=1400 audit(1536419875.559:24053): avc: denied { map } for pid=14240 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.516685] audit: type=1400 audit(1536419875.559:24054): avc: denied { map } for pid=14240 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.560123] audit: type=1400 audit(1536419875.559:24055): avc: denied { map } for pid=14240 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.586067] audit: type=1400 audit(1536419875.579:24056): avc: denied { map } for pid=14240 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:55 executing program 1: [ 2471.610503] audit: type=1400 audit(1536419875.579:24057): avc: denied { map } for pid=14240 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2471.635024] audit: type=1400 audit(1536419875.599:24058): avc: denied { map } for pid=14240 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:17:55 executing program 6: 15:17:55 executing program 5: 15:17:56 executing program 5: 15:17:56 executing program 6: 15:17:56 executing program 5: 15:17:56 executing program 6: 15:17:56 executing program 5: 15:17:56 executing program 6: [ 2477.519471] kauditd_printk_skb: 34 callbacks suppressed [ 2477.519481] audit: type=1400 audit(1536419881.789:24093): avc: denied { map } for pid=14254 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.590094] audit: type=1400 audit(1536419881.809:24094): avc: denied { map } for pid=14254 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.640093] audit: type=1400 audit(1536419881.809:24095): avc: denied { map } for pid=14254 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.691011] audit: type=1400 audit(1536419881.809:24096): avc: denied { map } for pid=14254 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.760110] audit: type=1400 audit(1536419881.829:24097): avc: denied { map } for pid=14254 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.830107] audit: type=1400 audit(1536419881.829:24098): avc: denied { map } for pid=14254 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.880165] audit: type=1400 audit(1536419881.829:24099): avc: denied { map } for pid=14254 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.940159] audit: type=1400 audit(1536419881.849:24100): avc: denied { map } for pid=14254 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2477.990103] audit: type=1400 audit(1536419881.849:24101): avc: denied { map } for pid=14254 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2478.030153] audit: type=1400 audit(1536419881.869:24102): avc: denied { map } for pid=14254 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.401262] kauditd_printk_skb: 1 callbacks suppressed [ 2493.401271] audit: type=1400 audit(1536419897.679:24104): avc: denied { map } for pid=14260 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.490103] audit: type=1400 audit(1536419897.709:24105): avc: denied { map } for pid=14260 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.529790] audit: type=1400 audit(1536419897.709:24106): avc: denied { map } for pid=14260 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.555522] audit: type=1400 audit(1536419897.709:24107): avc: denied { map } for pid=14260 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.581280] audit: type=1400 audit(1536419897.739:24108): avc: denied { map } for pid=14260 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.605411] audit: type=1400 audit(1536419897.739:24109): avc: denied { map } for pid=14260 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.631343] audit: type=1400 audit(1536419897.739:24110): avc: denied { map } for pid=14260 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.658262] audit: type=1400 audit(1536419897.759:24111): avc: denied { map } for pid=14260 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.720134] audit: type=1400 audit(1536419897.759:24112): avc: denied { map } for pid=14260 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2493.751041] audit: type=1400 audit(1536419897.789:24113): avc: denied { map } for pid=14260 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:18:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10, 0x6000c00e}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000002700030b00000000000000000300000066439d5e21dab34b00000000000000000000000000fd81b3fa3191c3c8f8bbab266897635f97d212c664eb9b75a27d282775"], 0x1}}, 0x0) 15:18:20 executing program 5: 15:18:20 executing program 7: 15:18:20 executing program 6: 15:18:20 executing program 2: 15:18:20 executing program 4: 15:18:20 executing program 3: 15:18:20 executing program 1: 15:18:21 executing program 5: accept4$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0x10, 0x0) r0 = socket$inet(0x2, 0x3, 0xb5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='gre0\x00', 0x2c8) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000002000)={0x2, 0x0, @multicast1}, 0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000300)={'icmp\x00'}, &(0x7f0000000340)=0x1e) 15:18:21 executing program 6: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000dbf000), 0x3a8, 0x0, &(0x7f0000b2d000)={0x2, 0x0, @loopback}, 0x10) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2715, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x3e3) 15:18:21 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$inet(0x2, 0x3, 0x2) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000240)=""/146, 0x92}], 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x1ffa, 0x3ff) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000cd2ff0), 0x10) 15:18:21 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d0252926285717070") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) 15:18:21 executing program 5: syz_emit_ethernet(0x32, &(0x7f0000000040)={@random="f1cec3281d34", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)={0x0, 0x0, [0x0, 0x0, 0x400000]}) 15:18:21 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000380), 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@ipv4_delrule={0x30, 0x21, 0x921, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, [@FRA_SRC={0x8, 0x2, @local}, @FRA_GENERIC_POLICY=@FRA_PROTOCOL={0x8, 0x15, 0x2}]}, 0x30}}, 0x0) 15:18:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x803, 0x2000000003) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0aaa2d0252926285717070") getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000180)=0x44) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socket$packet(0x11, 0x3, 0x300) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000580)=@nfc, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/20, 0x14, 0x2}, 0x0) 15:18:22 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) [ 2510.887559] kauditd_printk_skb: 81 callbacks suppressed [ 2510.887568] audit: type=1400 audit(1536419915.159:24195): avc: denied { map } for pid=14306 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2510.960143] audit: type=1400 audit(1536419915.209:24196): avc: denied { map } for pid=14306 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.030096] audit: type=1400 audit(1536419915.209:24197): avc: denied { map } for pid=14306 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.080095] audit: type=1400 audit(1536419915.209:24198): avc: denied { map } for pid=14306 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.130098] audit: type=1400 audit(1536419915.229:24199): avc: denied { map } for pid=14306 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.180091] audit: type=1400 audit(1536419915.229:24200): avc: denied { map } for pid=14306 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.250114] audit: type=1400 audit(1536419915.229:24201): avc: denied { map } for pid=14306 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.300135] audit: type=1400 audit(1536419915.249:24202): avc: denied { map } for pid=14306 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.350173] audit: type=1400 audit(1536419915.249:24203): avc: denied { map } for pid=14306 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.400149] audit: type=1400 audit(1536419915.269:24204): avc: denied { map } for pid=14306 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2517.859440] kauditd_printk_skb: 1 callbacks suppressed [ 2517.859449] audit: type=1400 audit(1536419922.129:24206): avc: denied { map } for pid=14307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2517.910106] audit: type=1400 audit(1536419922.179:24207): avc: denied { map } for pid=14307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2517.960129] audit: type=1400 audit(1536419922.179:24208): avc: denied { map } for pid=14307 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.010103] audit: type=1400 audit(1536419922.179:24209): avc: denied { map } for pid=14307 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.060097] audit: type=1400 audit(1536419922.199:24210): avc: denied { map } for pid=14307 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.110097] audit: type=1400 audit(1536419922.199:24211): avc: denied { map } for pid=14307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.170106] audit: type=1400 audit(1536419922.219:24212): avc: denied { map } for pid=14307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.220111] audit: type=1400 audit(1536419922.219:24213): avc: denied { map } for pid=14307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.270104] audit: type=1400 audit(1536419922.219:24214): avc: denied { map } for pid=14307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.330126] audit: type=1400 audit(1536419922.239:24215): avc: denied { map } for pid=14307 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:18:50 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000380)) 15:18:50 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r2 = dup2(r1, r0) readahead(r2, 0x0, 0x0) 15:18:50 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) 15:18:50 executing program 2: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "634bc294fcd817a0f894fbbfe9332428c5a5ef9284410164c96706c5d31cde1d730a38498bf94b4d62df8bc704caf9cbd55d1124a5defd8347b746fb8b8cb11f", "ca4274bf3fa29b8aaebac4c8b5fdf3774fd6bd23e5806e7861a859ff142443a7"}) 15:18:50 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = dup(r0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000000c0)=""/144) 15:18:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)) 15:18:50 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)) 15:18:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2080, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000240)=""/204) 15:18:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt6_stats\x00') ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000000)) 15:18:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2000, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 15:18:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup(r0) ioctl$TIOCSBRK(r2, 0x40044591) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000200)) 15:18:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) 15:18:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 15:18:51 executing program 5: write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000100)={0x9}, 0x9) 15:18:51 executing program 5: ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000280)=""/4096) 15:18:51 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) 15:18:52 executing program 5: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) [ 2533.230993] kauditd_printk_skb: 12 callbacks suppressed [ 2533.231002] audit: type=1400 audit(1536419937.509:24228): avc: denied { map } for pid=14341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.310197] audit: type=1400 audit(1536419937.509:24229): avc: denied { map } for pid=14341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.360145] audit: type=1400 audit(1536419937.509:24230): avc: denied { map } for pid=14341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.421078] audit: type=1400 audit(1536419937.509:24231): avc: denied { map } for pid=14341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.500144] audit: type=1400 audit(1536419937.549:24232): avc: denied { map } for pid=14341 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.568858] audit: type=1400 audit(1536419937.559:24233): avc: denied { map } for pid=14341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.620127] audit: type=1400 audit(1536419937.559:24234): avc: denied { map } for pid=14341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.670135] audit: type=1400 audit(1536419937.599:24235): avc: denied { map } for pid=14341 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.720132] audit: type=1400 audit(1536419937.599:24236): avc: denied { map } for pid=14341 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2533.770125] audit: type=1400 audit(1536419937.629:24237): avc: denied { map } for pid=14341 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.389516] kauditd_printk_skb: 1 callbacks suppressed [ 2539.389525] audit: type=1400 audit(1536419943.659:24239): avc: denied { map } for pid=14347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.460107] audit: type=1400 audit(1536419943.709:24240): avc: denied { map } for pid=14347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.520156] audit: type=1400 audit(1536419943.709:24241): avc: denied { map } for pid=14347 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.570103] audit: type=1400 audit(1536419943.709:24242): avc: denied { map } for pid=14347 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.620268] audit: type=1400 audit(1536419943.729:24243): avc: denied { map } for pid=14347 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.670189] audit: type=1400 audit(1536419943.729:24244): avc: denied { map } for pid=14347 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.740176] audit: type=1400 audit(1536419943.729:24245): avc: denied { map } for pid=14347 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.870183] audit: type=1400 audit(1536419943.759:24246): avc: denied { map } for pid=14347 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.920133] audit: type=1400 audit(1536419943.759:24247): avc: denied { map } for pid=14347 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.944772] audit: type=1400 audit(1536419943.779:24248): avc: denied { map } for pid=14347 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2545.697811] kauditd_printk_skb: 12 callbacks suppressed [ 2545.697820] audit: type=1400 audit(1536419949.969:24261): avc: denied { map } for pid=14353 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2545.750331] audit: type=1400 audit(1536419950.019:24262): avc: denied { map } for pid=14353 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2545.800161] audit: type=1400 audit(1536419950.019:24263): avc: denied { map } for pid=14353 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2545.850121] audit: type=1400 audit(1536419950.019:24264): avc: denied { map } for pid=14353 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2545.900134] audit: type=1400 audit(1536419950.029:24265): avc: denied { map } for pid=14353 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2545.950149] audit: type=1400 audit(1536419950.029:24266): avc: denied { map } for pid=14353 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2546.000135] audit: type=1400 audit(1536419950.059:24267): avc: denied { map } for pid=14353 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2546.050129] audit: type=1400 audit(1536419950.059:24268): avc: denied { map } for pid=14353 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2546.100152] audit: type=1400 audit(1536419950.059:24269): avc: denied { map } for pid=14353 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2546.150146] audit: type=1400 audit(1536419950.079:24270): avc: denied { map } for pid=14353 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)) 15:19:19 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000040)) 15:19:19 executing program 6: getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 15:19:19 executing program 4: syz_execute_func(&(0x7f0000002540)="3666440f50f56664400f9f3241c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000240)=""/82) 15:19:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000000)) 15:19:19 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000200)=""/239) 15:19:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000140)=""/16) 15:19:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000000)=""/106) 15:19:19 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/11, 0xffffff51) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = dup(r0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x0) 15:19:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) r1 = dup2(r0, r0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000140)=""/130) 15:19:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000000)) [ 2555.806434] kauditd_printk_skb: 1 callbacks suppressed [ 2555.806443] audit: type=1400 audit(1536419960.079:24272): avc: denied { map } for pid=14367 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2555.880143] audit: type=1400 audit(1536419960.109:24273): avc: denied { map } for pid=14367 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2555.950104] audit: type=1400 audit(1536419960.119:24274): avc: denied { map } for pid=14367 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2556.009760] audit: type=1400 audit(1536419960.119:24275): avc: denied { map } for pid=14367 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) fcntl$getown(r0, 0x9) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) [ 2556.067099] audit: type=1400 audit(1536419960.139:24276): avc: denied { map } for pid=14367 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2556.183384] audit: type=1400 audit(1536419960.149:24277): avc: denied { map } for pid=14367 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2556.233525] audit: type=1400 audit(1536419960.159:24278): avc: denied { map } for pid=14367 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2556.302637] audit: type=1400 audit(1536419960.159:24279): avc: denied { map } for pid=14367 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2556.343464] audit: type=1400 audit(1536419960.159:24280): avc: denied { map } for pid=14367 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2556.393502] audit: type=1400 audit(1536419960.199:24281): avc: denied { map } for pid=14367 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$LOOP_CLR_FD(r2, 0x4c01) 15:19:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/11, 0x10000003b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = dup(r0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/25) 15:19:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/132, 0x84) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = dup2(r0, r0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000005c0)=""/238) 15:19:21 executing program 5: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) [ 2568.669513] kauditd_printk_skb: 59 callbacks suppressed [ 2568.669521] audit: type=1400 audit(1536419972.939:24341): avc: denied { map } for pid=14409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.740114] audit: type=1400 audit(1536419972.989:24342): avc: denied { map } for pid=14409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.790119] audit: type=1400 audit(1536419972.989:24343): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.860149] audit: type=1400 audit(1536419972.989:24344): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.940138] audit: type=1400 audit(1536419973.009:24345): avc: denied { map } for pid=14409 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2569.030107] audit: type=1400 audit(1536419973.009:24346): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2569.110105] audit: type=1400 audit(1536419973.009:24347): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2569.180090] audit: type=1400 audit(1536419973.039:24348): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2569.250098] audit: type=1400 audit(1536419973.049:24349): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2569.300095] audit: type=1400 audit(1536419973.049:24350): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.119375] kauditd_printk_skb: 12 callbacks suppressed [ 2575.119384] audit: type=1400 audit(1536419979.389:24363): avc: denied { map } for pid=14412 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.190090] audit: type=1400 audit(1536419979.439:24364): avc: denied { map } for pid=14412 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.250103] audit: type=1400 audit(1536419979.439:24365): avc: denied { map } for pid=14412 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.290140] audit: type=1400 audit(1536419979.439:24366): avc: denied { map } for pid=14412 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.340101] audit: type=1400 audit(1536419979.459:24367): avc: denied { map } for pid=14412 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.390101] audit: type=1400 audit(1536419979.459:24368): avc: denied { map } for pid=14412 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.440102] audit: type=1400 audit(1536419979.459:24369): avc: denied { map } for pid=14412 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.490863] audit: type=1400 audit(1536419979.499:24370): avc: denied { map } for pid=14412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.540088] audit: type=1400 audit(1536419979.499:24371): avc: denied { map } for pid=14412 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2575.580074] audit: type=1400 audit(1536419979.519:24372): avc: denied { map } for pid=14412 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:48 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000000), 0x4) 15:19:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000080)=""/141) 15:19:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) 15:19:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = dup(r0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)) 15:19:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) 15:19:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) 15:19:48 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000700)=""/185) 15:19:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000240)) 15:19:48 executing program 5: ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) 15:19:48 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000000c0)) 15:19:49 executing program 6: ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000500)=""/83) 15:19:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup(r0) ioctl$TIOCSBRK(r2, 0x40044591) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)) [ 2584.745510] kauditd_printk_skb: 1 callbacks suppressed [ 2584.745519] audit: type=1400 audit(1536419989.019:24374): avc: denied { map } for pid=14421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2584.850148] audit: type=1400 audit(1536419989.019:24375): avc: denied { map } for pid=14421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2584.910130] audit: type=1400 audit(1536419989.029:24376): avc: denied { map } for pid=14421 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:49 executing program 6: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000001fc1)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000000c0)=""/59) [ 2585.010149] audit: type=1400 audit(1536419989.029:24377): avc: denied { map } for pid=14421 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2585.090145] audit: type=1400 audit(1536419989.059:24378): avc: denied { map } for pid=14421 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:49 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$lock(r0, 0x7, &(0x7f0000000080)) [ 2585.188161] audit: type=1400 audit(1536419989.079:24379): avc: denied { map } for pid=14421 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:49 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000040)=""/138) [ 2585.310114] audit: type=1400 audit(1536419989.079:24380): avc: denied { map } for pid=14421 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2585.380093] audit: type=1400 audit(1536419989.109:24381): avc: denied { map } for pid=14421 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:49 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r0, r1, 0x0) [ 2585.466343] audit: type=1400 audit(1536419989.109:24382): avc: denied { map } for pid=14421 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2585.540121] audit: type=1400 audit(1536419989.129:24383): avc: denied { map } for pid=14421 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:19:50 executing program 5: ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000180)) [ 2597.414803] kauditd_printk_skb: 12 callbacks suppressed [ 2597.414812] audit: type=1400 audit(1536420001.689:24396): avc: denied { map } for pid=14464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2597.540101] audit: type=1400 audit(1536420001.689:24397): avc: denied { map } for pid=14464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2597.650097] audit: type=1400 audit(1536420001.699:24399): avc: denied { map } for pid=14461 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2597.770237] audit: type=1400 audit(1536420001.699:24400): avc: denied { map } for pid=14461 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2597.816259] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2597.816266] audit: audit_lost=258 audit_rate_limit=0 audit_backlog_limit=64 [ 2597.816271] audit: backlog limit exceeded [ 2597.818039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2597.818045] audit: audit_lost=259 audit_rate_limit=0 audit_backlog_limit=64 [ 2597.818050] audit: backlog limit exceeded [ 2602.939659] kauditd_printk_skb: 245 callbacks suppressed [ 2602.939667] audit: type=1400 audit(1536420007.209:24495): avc: denied { map } for pid=14468 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.030097] audit: type=1400 audit(1536420007.259:24496): avc: denied { map } for pid=14468 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.110133] audit: type=1400 audit(1536420007.259:24497): avc: denied { map } for pid=14468 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.160109] audit: type=1400 audit(1536420007.259:24498): avc: denied { map } for pid=14468 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.230121] audit: type=1400 audit(1536420007.289:24499): avc: denied { map } for pid=14468 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.310131] audit: type=1400 audit(1536420007.289:24500): avc: denied { map } for pid=14468 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.380120] audit: type=1400 audit(1536420007.289:24501): avc: denied { map } for pid=14468 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.431036] audit: type=1400 audit(1536420007.309:24502): avc: denied { map } for pid=14468 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.480139] audit: type=1400 audit(1536420007.309:24503): avc: denied { map } for pid=14468 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2603.530130] audit: type=1400 audit(1536420007.339:24504): avc: denied { map } for pid=14468 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2608.185067] kauditd_printk_skb: 1 callbacks suppressed [ 2608.185077] audit: type=1400 audit(1536420012.459:24506): avc: denied { map } for pid=14469 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2608.260100] audit: type=1400 audit(1536420012.459:24507): avc: denied { map } for pid=14469 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2608.330175] audit: type=1400 audit(1536420012.479:24508): avc: denied { map } for pid=14469 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2608.420124] audit: type=1400 audit(1536420012.479:24509): avc: denied { map } for pid=14469 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2608.541855] audit: type=1400 audit(1536420012.479:24510): avc: denied { map } for pid=14469 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2608.651028] audit: type=1400 audit(1536420012.499:24511): avc: denied { map } for pid=14470 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2608.735791] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2608.735799] audit: audit_lost=310 audit_rate_limit=0 audit_backlog_limit=64 [ 2608.735803] audit: backlog limit exceeded [ 2608.737340] audit: audit_backlog=65 > audit_backlog_limit=64 15:20:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000000)=""/115) 15:20:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='limits\x00') ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)}) 15:20:15 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:20:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000140)) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000080)={0x0, {{0x2, 0x0, @rand_addr}}}, 0x88) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) dup(0xffffffffffffffff) 15:20:15 executing program 6: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)) 15:20:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$KDADDIO(r1, 0x4b34, 0x0) 15:20:15 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='environ\x00') fchmod(r0, 0x0) 15:20:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000200)=""/227) 15:20:15 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000080)) 15:20:15 executing program 6: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000200)) 15:20:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1001082) r1 = memfd_create(&(0x7f0000000040)="9d23000000a73f33efc6d1a6230d8379f3b2e6620000000000000000000000ffff7f1794245ee14f62e1", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) pwrite64(r0, &(0x7f00000000c0)='h', 0x1, 0x0) 15:20:16 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000180)) 15:20:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) write$evdev(r0, &(0x7f0000000140), 0x0) 15:20:16 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@loopback, 0x0, r1}) 15:20:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) getpeername$unix(r1, &(0x7f0000000040), &(0x7f0000000140)=0x6e) 15:20:16 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101001, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x0) [ 2622.164397] kauditd_printk_skb: 182 callbacks suppressed [ 2622.164406] audit: type=1400 audit(1536420026.439:24638): avc: denied { map } for pid=14519 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.250100] audit: type=1400 audit(1536420026.469:24639): avc: denied { map } for pid=14519 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.330144] audit: type=1400 audit(1536420026.469:24640): avc: denied { map } for pid=14519 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.430092] audit: type=1400 audit(1536420026.499:24641): avc: denied { map } for pid=14519 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.550283] audit: type=1400 audit(1536420026.499:24642): avc: denied { map } for pid=14519 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.630179] audit: type=1400 audit(1536420026.519:24643): avc: denied { map } for pid=14519 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.656135] audit: type=1400 audit(1536420026.519:24644): avc: denied { map } for pid=14519 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.656163] audit: type=1400 audit(1536420026.569:24645): avc: denied { map } for pid=14519 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.656185] audit: type=1400 audit(1536420026.569:24646): avc: denied { map } for pid=14519 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2622.656209] audit: type=1400 audit(1536420026.689:24647): avc: denied { map } for pid=14519 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.349495] kauditd_printk_skb: 132 callbacks suppressed [ 2628.349505] audit: type=1400 audit(1536420032.619:24780): avc: denied { map } for pid=14528 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.410106] audit: type=1400 audit(1536420032.639:24781): avc: denied { map } for pid=14528 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.450085] audit: type=1400 audit(1536420032.639:24782): avc: denied { map } for pid=14528 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.500872] audit: type=1400 audit(1536420032.639:24783): avc: denied { map } for pid=14528 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.550089] audit: type=1400 audit(1536420032.659:24784): avc: denied { map } for pid=14528 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.600093] audit: type=1400 audit(1536420032.659:24785): avc: denied { map } for pid=14528 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.660094] audit: type=1400 audit(1536420032.659:24786): avc: denied { map } for pid=14528 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.710088] audit: type=1400 audit(1536420032.679:24787): avc: denied { map } for pid=14528 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.734589] audit: type=1400 audit(1536420032.679:24788): avc: denied { map } for pid=14528 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2628.759092] audit: type=1400 audit(1536420032.699:24789): avc: denied { map } for pid=14528 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.352209] kauditd_printk_skb: 43 callbacks suppressed [ 2633.352219] audit: type=1400 audit(1536420037.629:24833): avc: denied { map } for pid=14531 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.471041] audit: type=1400 audit(1536420037.639:24834): avc: denied { map } for pid=14534 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.556810] audit: type=1400 audit(1536420037.659:24835): avc: denied { map } for pid=14532 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.670106] audit: type=1400 audit(1536420037.659:24836): avc: denied { map } for pid=14532 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.750167] audit: type=1400 audit(1536420037.669:24837): avc: denied { map } for pid=14534 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.804316] audit: type=1400 audit(1536420037.669:24838): avc: denied { map } for pid=14534 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.861101] audit: type=1400 audit(1536420037.669:24839): avc: denied { map } for pid=14534 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2633.905922] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2633.905929] audit: audit_lost=330 audit_rate_limit=0 audit_backlog_limit=64 [ 2633.905934] audit: backlog limit exceeded 15:20:46 executing program 0: 15:20:46 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0xfffffffffffffeae, 0x0) 15:20:46 executing program 3: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x140ffa, 0x181) 15:20:46 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$setfpexc(0xc, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x20) 15:20:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1c6) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) prctl$setfpexc(0xc, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000), 0x4) 15:20:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={"6c6f00000000000000000000000000e2"}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="005a953f9300ef660000f2ff"], 0x1}}, 0x0) 15:20:46 executing program 7: 15:20:46 executing program 2: 15:20:47 executing program 6: 15:20:47 executing program 5: 15:20:47 executing program 6: 15:20:47 executing program 5: [ 2643.057954] kauditd_printk_skb: 78 callbacks suppressed [ 2643.057963] audit: type=1400 audit(1536420047.329:24906): avc: denied { map } for pid=14546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2643.170100] audit: type=1400 audit(1536420047.389:24907): avc: denied { map } for pid=14546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2643.270111] audit: type=1400 audit(1536420047.389:24908): avc: denied { map } for pid=14546 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:20:47 executing program 5: [ 2643.400155] audit: type=1400 audit(1536420047.389:24909): avc: denied { map } for pid=14546 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:20:47 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000800)=""/109, 0x6d}], 0x1) [ 2643.500185] audit: type=1400 audit(1536420047.399:24910): avc: denied { map } for pid=14544 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2643.570097] audit: type=1400 audit(1536420047.399:24911): avc: denied { map } for pid=14544 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2643.620097] audit: type=1400 audit(1536420047.419:24912): avc: denied { map } for pid=14546 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2643.680116] audit: type=1400 audit(1536420047.419:24913): avc: denied { map } for pid=14546 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:20:48 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={"627269646765300000f1ff00", &(0x7f0000000200)=ANY=[@ANYBLOB='\v']}) [ 2643.756003] audit: type=1400 audit(1536420047.419:24914): avc: denied { map } for pid=14546 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:20:48 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') [ 2643.820095] audit: type=1400 audit(1536420047.429:24915): avc: denied { map } for pid=14544 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:20:48 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000d06000)=0x1, 0x4) [ 2653.698808] kauditd_printk_skb: 200 callbacks suppressed [ 2653.698818] audit: type=1400 audit(1536420057.969:25116): avc: denied { map } for pid=14583 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.750091] audit: type=1400 audit(1536420057.989:25117): avc: denied { map } for pid=14583 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.800096] audit: type=1400 audit(1536420057.989:25118): avc: denied { map } for pid=14583 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.860132] audit: type=1400 audit(1536420057.989:25119): avc: denied { map } for pid=14583 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.910291] audit: type=1400 audit(1536420058.009:25120): avc: denied { map } for pid=14583 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.960199] audit: type=1400 audit(1536420058.009:25121): avc: denied { map } for pid=14583 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2654.010160] audit: type=1400 audit(1536420058.009:25122): avc: denied { map } for pid=14583 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2654.060132] audit: type=1400 audit(1536420058.029:25123): avc: denied { map } for pid=14583 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2654.110123] audit: type=1400 audit(1536420058.029:25124): avc: denied { map } for pid=14583 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2654.150163] audit: type=1400 audit(1536420058.109:25125): avc: denied { map } for pid=14583 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2660.941779] kauditd_printk_skb: 120 callbacks suppressed [ 2660.941789] audit: type=1400 audit(1536420065.219:25246): avc: denied { map } for pid=14591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.020096] audit: type=1400 audit(1536420065.249:25247): avc: denied { map } for pid=14591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.090135] audit: type=1400 audit(1536420065.249:25248): avc: denied { map } for pid=14591 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.160094] audit: type=1400 audit(1536420065.249:25249): avc: denied { map } for pid=14591 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.240132] audit: type=1400 audit(1536420065.269:25250): avc: denied { map } for pid=14591 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.281005] audit: type=1400 audit(1536420065.269:25251): avc: denied { map } for pid=14591 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.350127] audit: type=1400 audit(1536420065.269:25252): avc: denied { map } for pid=14591 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.400123] audit: type=1400 audit(1536420065.289:25253): avc: denied { map } for pid=14591 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.450112] audit: type=1400 audit(1536420065.289:25254): avc: denied { map } for pid=14591 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2661.500124] audit: type=1400 audit(1536420065.299:25255): avc: denied { map } for pid=14591 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2665.996351] kauditd_printk_skb: 41 callbacks suppressed [ 2665.996360] audit: type=1400 audit(1536420070.269:25297): avc: denied { map } for pid=14595 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.091534] audit: type=1400 audit(1536420070.289:25298): avc: denied { map } for pid=14595 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.160100] audit: type=1400 audit(1536420070.289:25299): avc: denied { map } for pid=14595 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.250118] audit: type=1400 audit(1536420070.289:25300): avc: denied { map } for pid=14595 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.340133] audit: type=1400 audit(1536420070.309:25301): avc: denied { map } for pid=14595 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.440120] audit: type=1400 audit(1536420070.309:25302): avc: denied { map } for pid=14595 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.510104] audit: type=1400 audit(1536420070.319:25303): avc: denied { map } for pid=14595 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.590103] audit: type=1400 audit(1536420070.319:25304): avc: denied { map } for pid=14595 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.598743] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2666.598750] audit: audit_lost=335 audit_rate_limit=0 audit_backlog_limit=64 15:21:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001640)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)=@l2, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/175, 0xaf}, {&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f0000000200)=""/78, 0x4e}, {&(0x7f0000000280)=""/186, 0xba}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/118, 0x76}, {&(0x7f0000000400)=""/56, 0x38}, {&(0x7f0000000440)=""/47, 0x2f}, {&(0x7f0000000480)=""/254, 0xfe}], 0x9, &(0x7f0000000640)=""/57, 0x39, 0x4}, 0x727cf36d}, {{&(0x7f0000000680)=@ipx, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000700)=""/49, 0x31}, {&(0x7f0000000740)=""/27, 0x1b}, {&(0x7f0000000780)=""/195, 0xc3}, {&(0x7f0000000880)=""/246, 0xf6}, {&(0x7f0000000980)=""/139, 0x8b}], 0x5, 0x0, 0x0, 0x2}, 0xc89f}, {{&(0x7f0000000ac0)=@rc, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000000b80)=""/53, 0x35, 0x4}, 0x3f}, {{&(0x7f0000000bc0)=@l2, 0x80, &(0x7f0000001000)=[{&(0x7f0000000c40)=""/141, 0x8d}, {&(0x7f0000000d00)=""/57, 0x39}, {&(0x7f0000000d40)=""/197, 0xc5}, {&(0x7f0000000e40)=""/222, 0xde}, {&(0x7f0000000f40)=""/168, 0xa8}], 0x5, &(0x7f0000001080)=""/216, 0xd8, 0x4}, 0x1ff}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000001180)=""/18, 0x12}, {&(0x7f00000011c0)=""/170, 0xaa}], 0x2, 0x0, 0x0, 0x3}, 0x10000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000012c0)=""/72, 0x48}, {&(0x7f0000001340)=""/63, 0x3f}], 0x2, &(0x7f00000013c0)=""/216, 0xd8, 0x80000001}, 0x1ff}], 0x6, 0x2000, &(0x7f0000001680)={r1, r2+30000000}) dup2(r0, r0) 15:21:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e3"], 0x1) recvfrom(r2, &(0x7f0000000300)=""/68, 0x44, 0x0, &(0x7f0000000140)=@hci, 0x7070a0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) listen(r3, 0x0) listen(r0, 0x0) 15:21:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e3"], 0x1) recvfrom(r2, &(0x7f0000000300)=""/68, 0x44, 0x0, &(0x7f0000000140)=@hci, 0x7070a0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) listen(r3, 0x0) 15:21:11 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x856, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000002480)) 15:21:11 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) ptrace$peek(0x2, r1, &(0x7f0000000100)) r2 = fcntl$getown(r0, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x1, r2}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000200)='syz1\x00') ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)='veth0_to_bridge\x00') 15:21:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x53) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000010c0)=""/179) getgid() r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1e, &(0x7f00000000c0)="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", 0x1000) getsockopt$packet_buf(r2, 0x107, 0x8, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0x75) 15:21:11 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "660704", 0x2c, 0x0, 0x0, @remote, @ipv4={[], [], @remote}, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@empty]}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000040)={0x1, 0x0, [0x0, 0x84, 0x0, 0xb55]}) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x417, 0x280002) 15:21:11 executing program 7: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5844b0c1c637000859967474b1c3f6c7c418c8a10b8331101b1ec8f255888ff3461b8d0361b273c94393fc7e668b71a065de091c58614d92cdeb3e5c9270e7c20595a7bf3611ba9ae59fb91338b2d50948bf1049"], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000002c0)) readlinkat(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000640)=""/92, 0x5c) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) fstatfs(0xffffffffffffffff, &(0x7f0000000900)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x16b0b9c7d5bd04ba) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x2000006, &(0x7f0000000580)) umount2(&(0x7f0000000440)='./file0\x00', 0x0) 15:21:11 executing program 5: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) bind(r1, &(0x7f0000000180)=@in={0x2, 0x4e22, @multicast2}, 0x80) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x8, &(0x7f0000000140), &(0x7f0000000080)=0x559) 15:21:11 executing program 6: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfec4, 0x4008000, &(0x7f0000001000)={0x2, 0x0, @broadcast}, 0xfffffffffffffe1e) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x26, 0x15, 0x0, 0xe, 0x0, 0x80000000, 0x0, 0x27}}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000300)=0xfffffffd) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r1 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd5", 0x17, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xcf39, 0x80000001}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x800000, &(0x7f0000000480)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000280)=0xc1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x81, 0x9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000380)}, 0x1000, 0x0, 0x200, 0x2, 0x0, 0x2, 0x1ff}, r5, 0xe, r1, 0x2) fcntl$dupfd(r3, 0x0, r2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) r6 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x5, 0x4) 15:21:11 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team0\x00', &(0x7f0000000080)=@ethtool_perm_addr={0x20, 0xc, "83f804f52eb08c62c7b005e8"}}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_score\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 15:21:11 executing program 6: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) read$eventfd(r0, &(0x7f0000000080), 0x8) io_setup(0x2, &(0x7f0000000040)=0x0) r2 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000ddc000), 0x0, 0x0, 0x0, 0x1, r0}]) 15:21:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000001b40)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0x4, r1, &(0x7f0000000040)=""/56, 0xb6c9) keyctl$setperm(0x5, r1, 0x8010320) getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xee01]) setgroups(0x1, &(0x7f0000000080)=[r2]) keyctl$get_security(0x3, r1, &(0x7f0000003b80)=""/4096, 0x1000) 15:21:12 executing program 5: r0 = socket(0x13, 0x805, 0x2000000000004) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 15:21:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=@delsa={0x3c, 0x11, 0x11, 0x0, 0x0, {@in6=@mcast1}, [@srcaddr={0x14}]}, 0x3c}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e24, 0x7fffffff, @mcast2, 0x8}, {0xa, 0x4e21, 0x7, @empty, 0x864f}, 0x31, [0x167, 0x2, 0x6, 0x1, 0x2, 0x9, 0x2, 0x7fff]}, 0x5c) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 15:21:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2400000000000000, 0x408000) creat(&(0x7f0000000040)='./file0\x00', 0x4a) [ 2674.398862] kauditd_printk_skb: 158 callbacks suppressed [ 2674.398871] audit: type=1400 audit(1536420078.669:25426): avc: denied { map } for pid=14648 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.441665] audit: type=1400 audit(1536420078.719:25427): avc: denied { map } for pid=14648 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.490102] audit: type=1400 audit(1536420078.719:25428): avc: denied { map } for pid=14648 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.540090] audit: type=1400 audit(1536420078.719:25429): avc: denied { map } for pid=14648 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.590084] audit: type=1400 audit(1536420078.739:25430): avc: denied { map } for pid=14648 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.650128] audit: type=1400 audit(1536420078.739:25431): avc: denied { map } for pid=14648 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.690102] audit: type=1400 audit(1536420078.759:25432): avc: denied { map } for pid=14648 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.740072] audit: type=1400 audit(1536420078.759:25433): avc: denied { map } for pid=14648 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.790080] audit: type=1400 audit(1536420078.759:25434): avc: denied { map } for pid=14648 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.840112] audit: type=1400 audit(1536420078.839:25435): avc: denied { map } for pid=14648 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2683.629305] kauditd_printk_skb: 119 callbacks suppressed [ 2683.629315] audit: type=1400 audit(1536420087.899:25555): avc: denied { map } for pid=14656 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2683.700092] audit: type=1400 audit(1536420087.919:25556): avc: denied { map } for pid=14656 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2683.770085] audit: type=1400 audit(1536420087.919:25557): avc: denied { map } for pid=14656 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2683.860120] audit: type=1400 audit(1536420087.919:25558): avc: denied { map } for pid=14656 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2683.940255] audit: type=1400 audit(1536420087.949:25559): avc: denied { map } for pid=14656 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.010505] audit: type=1400 audit(1536420087.949:25560): avc: denied { map } for pid=14656 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.060139] audit: type=1400 audit(1536420087.969:25561): avc: denied { map } for pid=14656 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.110100] audit: type=1400 audit(1536420087.969:25562): avc: denied { map } for pid=14656 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.160115] audit: type=1400 audit(1536420087.969:25563): avc: denied { map } for pid=14656 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.210217] audit: type=1400 audit(1536420088.009:25564): avc: denied { map } for pid=14656 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:36 executing program 0: utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0/bus/file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}, 0xec6e0d7bff8623f8) 15:21:36 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'veth0_to_bond\x00', 0xea61}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0xa, 0xfff, &(0x7f00000000c0)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0x2, &(0x7f00000001c0)) 15:21:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 15:21:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x900}, 0xc, &(0x7f0000000a80)={&(0x7f00000000c0)=@ipv6_newroute={0x24, 0x18, 0x311, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) 15:21:36 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x40d, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[], [], @remote}, 0x100000000, 0x0, 0x1, 0x2, 0x5, 0x9, 0x3ff}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0x9) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000140)=""/206) 15:21:36 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x9) r1 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e, 0x0) finit_module(r1, &(0x7f0000000180)='posix_acl_accesskeyringbdevtrustedeth1wlan0vboxnet0/.):vmnet0\x00', 0x3) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x202) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x400) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000140)={0xa, 0x8, 0x1}) 15:21:36 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000000)) 15:21:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001cc0)={'syz_tun\x00', &(0x7f0000001c80)=ANY=[@ANYBLOB="3701fcff157d592bc3d6040000000000"]}) [ 2692.764896] kauditd_printk_skb: 129 callbacks suppressed [ 2692.764905] audit: type=1400 audit(1536420097.039:25694): avc: denied { map } for pid=14673 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2692.862418] audit: type=1400 audit(1536420097.079:25695): avc: denied { map } for pid=14673 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:37 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) sendto$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)=@abs, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2692.914795] audit: type=1400 audit(1536420097.079:25696): avc: denied { map } for pid=14673 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000180)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0xfffffdbd) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) [ 2693.070133] audit: type=1400 audit(1536420097.079:25697): avc: denied { map } for pid=14673 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2693.170243] audit: type=1400 audit(1536420097.089:25698): avc: denied { map } for pid=14673 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2693.250191] audit: type=1400 audit(1536420097.089:25699): avc: denied { map } for pid=14673 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2693.316965] audit: type=1400 audit(1536420097.089:25700): avc: denied { map } for pid=14673 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:37 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) sendto$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)=@abs, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2693.380835] audit: type=1400 audit(1536420097.099:25701): avc: denied { map } for pid=14673 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2693.470109] audit: type=1400 audit(1536420097.099:25702): avc: denied { map } for pid=14673 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2693.550144] audit: type=1400 audit(1536420097.189:25703): avc: denied { map } for pid=14676 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:37 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) sendto$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)=@abs, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:38 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) sendto$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)=@abs, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socket(0x18, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 15:21:38 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) sendto$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)=@abs, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:38 executing program 6: socket$inet6(0xa, 0x803, 0x3) sendto$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)=@abs, 0x6e) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2697.858930] kauditd_printk_skb: 92 callbacks suppressed [ 2697.858940] audit: type=1400 audit(1536420102.129:25796): avc: denied { map } for pid=14714 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2697.950098] audit: type=1400 audit(1536420102.149:25797): avc: denied { map } for pid=14714 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.020092] audit: type=1400 audit(1536420102.149:25798): avc: denied { map } for pid=14714 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.090140] audit: type=1400 audit(1536420102.149:25799): avc: denied { map } for pid=14714 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.170136] audit: type=1400 audit(1536420102.159:25800): avc: denied { map } for pid=14714 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.230115] audit: type=1400 audit(1536420102.159:25801): avc: denied { map } for pid=14714 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.300144] audit: type=1400 audit(1536420102.189:25802): avc: denied { map } for pid=14714 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.370097] audit: type=1400 audit(1536420102.189:25803): avc: denied { map } for pid=14714 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.440085] audit: type=1400 audit(1536420102.189:25804): avc: denied { map } for pid=14714 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2698.521093] audit: type=1400 audit(1536420102.269:25805): avc: denied { map } for pid=14714 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "3" respawning too fast: disabled for 5 minutes [ 2706.319822] kauditd_printk_skb: 71 callbacks suppressed [ 2706.319832] audit: type=1400 audit(1536420110.589:25874): avc: denied { map } for pid=14720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.400095] audit: type=1400 audit(1536420110.639:25875): avc: denied { map } for pid=14720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.464860] audit: type=1400 audit(1536420110.639:25876): avc: denied { map } for pid=14720 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.510127] audit: type=1400 audit(1536420110.639:25877): avc: denied { map } for pid=14720 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.590126] audit: type=1400 audit(1536420110.659:25878): avc: denied { map } for pid=14720 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.680093] audit: type=1400 audit(1536420110.679:25879): avc: denied { map } for pid=14720 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.730109] audit: type=1400 audit(1536420110.679:25880): avc: denied { map } for pid=14720 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.780089] audit: type=1400 audit(1536420110.679:25881): avc: denied { map } for pid=14720 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.830081] audit: type=1400 audit(1536420110.679:25882): avc: denied { map } for pid=14720 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2706.880099] audit: type=1400 audit(1536420110.709:25883): avc: denied { map } for pid=14720 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes 15:21:57 executing program 3: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x1, &(0x7f0000000040)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) 15:21:57 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='em0@\x00', 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="222ee82c286678e8bdbe2183c8202bd3", 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x83, 0xff, 0x1}, 0x26e) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000001c0)=""/246, &(0x7f00000002c0)=0xf6) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket(0x15, 0x0, 0x3) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) getsockopt(r0, 0x80, 0x8, &(0x7f0000000140)=""/38, &(0x7f0000000180)=0x26) socket(0x0, 0xa, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r1, &(0x7f000000a000), &(0x7f0000006000)}, 0x20) 15:21:57 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f00000020c0)=[{{&(0x7f0000000c80)=@generic, 0x80, &(0x7f0000001e00), 0x0, &(0x7f0000001e40)=""/237, 0xed}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/keycreate\x00') pwritev(r1, &(0x7f0000001400), 0x2a6, 0x0) 15:21:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), 0x4) 15:21:57 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x80, 0x2, 0x8, 0x1, 0x0, 0x9, 0x80000, 0x0, 0x5, 0x80000000, 0x7fffffff, 0x8, 0x9, 0x3, 0x99f9, 0x5, 0x9, 0x0, 0xdc5, 0x5, 0x6, 0x2000000000, 0x3, 0x6, 0x0, 0x7fffffff, 0x2, 0x1, 0x3ff, 0x0, 0xff, 0xffffffff, 0x8, 0xffffffff, 0x2, 0x9, 0x0, 0x20, 0x4, @perf_config_ext={0x2b5, 0x9c}, 0x8000, 0x8000, 0x46, 0x4, 0x7f, 0x4f}) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_score\x00') ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x3, 0x9, 0xea3, 0x100000001, 0x3, 0x3, 0x7, 0x338, 0x40, 0x8e, 0x0, 0x7fff, 0x38, 0x1, 0x5, 0x8, 0x5}, [{0x60000000, 0x0, 0x7f, 0x7, 0x2, 0x4, 0x1, 0x6}, {0x0, 0x5, 0xb1, 0x4, 0x0, 0xf34a, 0x80, 0x6}], "672beb056b946c0ab1f796ee6c33ca38e9b54a626e4da0820b6c7c58b84fe087df8ee6f1ff8084933e08d4aca8634df8e8eadcc1fda39a128784223e2bcf0a8b19dd0d8725c7733148eb7d71f6322a33e43eed9e2ea8f8569d88307b265f49bf15b4a49a59d7c594c3982742a0fd38c0b36b332d", [[], [], [], [], [], []]}, 0x724) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)=0x1f) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f00000000c0)={0x20000007}) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000100)={0x633, 0x0, 0xb660, 0xf146, 0xffffffffffffff00, 0x6, 0xc5f4, 0x4, 0x9, 0xff}) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000180)={0x6d, 0x1, 0x3, 0x4, 0x5, 0x9, 0x1, 0x7, 0x1, 0x80}) 15:21:57 executing program 7: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair(0x3, 0x3, 0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080), 0x4) 15:21:57 executing program 6: socket$inet6(0xa, 0x803, 0x3) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000fc0)={0x0, @multicast1, @multicast2}, &(0x7f0000001000)=0xc) 15:21:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2713.165703] kauditd_printk_skb: 23 callbacks suppressed [ 2713.165713] audit: type=1400 audit(1536420117.439:25907): avc: denied { map } for pid=14726 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.220191] audit: type=1400 audit(1536420117.439:25908): avc: denied { map } for pid=14726 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:57 executing program 6: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2713.272125] audit: type=1400 audit(1536420117.449:25909): avc: denied { map } for pid=14726 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.350142] audit: type=1400 audit(1536420117.449:25910): avc: denied { map } for pid=14726 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.410152] audit: type=1400 audit(1536420117.479:25911): avc: denied { map } for pid=14726 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.450147] audit: type=1400 audit(1536420117.499:25912): avc: denied { map } for pid=14726 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.500117] audit: type=1400 audit(1536420117.499:25913): avc: denied { map } for pid=14726 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x0, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2713.580171] audit: type=1400 audit(1536420117.499:25914): avc: denied { map } for pid=14726 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.620159] audit: type=1400 audit(1536420117.499:25915): avc: denied { map } for pid=14726 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.670141] audit: type=1400 audit(1536420117.549:25916): avc: denied { map } for pid=14726 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:21:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x0, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x0, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:21:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:22:07 executing program 3: r0 = socket(0x2, 0x5, 0x0) timer_create(0x7, &(0x7f0000000100)={0x0, 0xf, 0x0, @thr={&(0x7f0000000000)="bf463b9fba87341465b72f52e62557dd95a13ab1f98b6ce6a11adf94ad6b01a964ef9f7f7b98afa6c54562588fe0b866faaf2c375a73c01b732911eee78073a5d925c788520da07d841f2501029a036f1dff8374f7f312d897285244e69968e19a0f75e716b921d20c9154ee89", &(0x7f0000000080)="908831e6fd0ac8abf16d015e846466034bf24480bc17b1f76750121e59022114f79e81b45456e6fa484c6437525c6a1fd067a1bd716a83630bee93584896357fcd7b1cf292bbc97dcffc13f079040a89b5b3bf01168dd4c7a70aef7c8ade0356a2"}}, &(0x7f0000000140)=0x0) timer_getoverrun(r1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f00000001c0)=0xc) setreuid(r2, 0x0) geteuid() [ 2730.481574] kauditd_printk_skb: 45 callbacks suppressed [ 2730.481583] audit: type=1400 audit(1536420134.759:25962): avc: denied { map } for pid=14755 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.570096] audit: type=1400 audit(1536420134.759:25963): avc: denied { map } for pid=14755 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.620081] audit: type=1400 audit(1536420134.759:25964): avc: denied { map } for pid=14755 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.690094] audit: type=1400 audit(1536420134.759:25965): avc: denied { map } for pid=14755 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.760095] audit: type=1400 audit(1536420134.779:25966): avc: denied { map } for pid=14755 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.840124] audit: type=1400 audit(1536420134.799:25967): avc: denied { map } for pid=14755 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.910098] audit: type=1400 audit(1536420134.799:25968): avc: denied { map } for pid=14755 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.970097] audit: type=1400 audit(1536420134.799:25969): avc: denied { map } for pid=14755 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2731.010088] audit: type=1400 audit(1536420134.819:25970): avc: denied { map } for pid=14755 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2731.060080] audit: type=1400 audit(1536420134.819:25971): avc: denied { map } for pid=14755 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:22:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000640), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) write$P9_RRENAMEAT(r1, &(0x7f0000000600)={0x7, 0x4b, 0x1}, 0x7) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r3 = syz_open_procfs(r2, &(0x7f00000003c0)='net/igmp6\x00') preadv(r3, &(0x7f0000000480), 0x10000000000001ed, 0x4c000000) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/78, 0x4e}, {&(0x7f00000002c0)=""/187, 0xbb}], 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000580)={{0x2, 0x4e24, @multicast2}, {0x6, @dev={[], 0x1f}}, 0x0, {0x2, 0x4e23, @loopback}, 'bond0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6=@ipv4={[], [], @remote}}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x78}], 0x1, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') ioctl$UI_DEV_CREATE(r5, 0x5501) preadv(r5, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000180)=""/152, 0x98}], 0x2, 0x0) setreuid(0x0, r4) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/status\x00', 0x0, 0x0) [ 2738.325074] kauditd_printk_skb: 12 callbacks suppressed [ 2738.325090] audit: type=1400 audit(1536420142.599:25984): avc: denied { map } for pid=14759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.400092] audit: type=1400 audit(1536420142.599:25985): avc: denied { map } for pid=14759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.460094] audit: type=1400 audit(1536420142.609:25986): avc: denied { map } for pid=14759 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.510094] audit: type=1400 audit(1536420142.609:25987): avc: denied { map } for pid=14759 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.580100] audit: type=1400 audit(1536420142.609:25988): avc: denied { map } for pid=14759 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.650773] audit: type=1400 audit(1536420142.639:25989): avc: denied { map } for pid=14759 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.700088] audit: type=1400 audit(1536420142.639:25990): avc: denied { map } for pid=14759 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.750091] audit: type=1400 audit(1536420142.659:25991): avc: denied { map } for pid=14759 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.800094] audit: type=1400 audit(1536420142.659:25992): avc: denied { map } for pid=14759 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2738.850093] audit: type=1400 audit(1536420142.679:25993): avc: denied { map } for pid=14759 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:22:24 executing program 5: 15:22:24 executing program 4: r0 = inotify_init() fchown(r0, 0x0, 0x0) 15:22:24 executing program 0: 15:22:24 executing program 1: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x100000001, 0x20000) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000837415fc6700000006907800000000e0000001140000000401907800c8d1f600071ccdc1188f86"], &(0x7f0000000040)) 15:22:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:22:24 executing program 7: 15:22:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:22:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:22:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x1c, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 15:22:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x1c, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 15:22:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x1c, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 15:22:26 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/253, 0xfd}], 0x1) 15:22:26 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d73d5e30785717070") bind$inet6(r0, &(0x7f00000014c0)={0xa, 0x4e21, 0xda2f, @loopback, 0xfffffffffffeffff}, 0x1c) 15:22:26 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000200)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}]}, 0x44}, 0x1, 0x0, 0x0, 0x8001}, 0x20000004) 15:22:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x1c, 0x18, 0x501}, 0x1c}}, 0x0) 15:22:30 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/dev\x00') write$P9_RLERROR(r0, &(0x7f0000000100)={0xc, 0x7, 0x0, {0x3, '#! '}}, 0xc) [ 2749.940501] kauditd_printk_skb: 59 callbacks suppressed [ 2749.940510] audit: type=1400 audit(1536420154.219:26053): avc: denied { map } for pid=14792 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.020097] audit: type=1400 audit(1536420154.249:26054): avc: denied { map } for pid=14792 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.090101] audit: type=1400 audit(1536420154.249:26055): avc: denied { map } for pid=14792 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.170104] audit: type=1400 audit(1536420154.249:26056): avc: denied { map } for pid=14792 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.240136] audit: type=1400 audit(1536420154.279:26057): avc: denied { map } for pid=14792 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.320112] audit: type=1400 audit(1536420154.279:26058): avc: denied { map } for pid=14792 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.407962] audit: type=1400 audit(1536420154.279:26059): avc: denied { map } for pid=14792 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.460117] audit: type=1400 audit(1536420154.329:26060): avc: denied { map } for pid=14792 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.510092] audit: type=1400 audit(1536420154.329:26061): avc: denied { map } for pid=14792 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.560098] audit: type=1400 audit(1536420154.329:26062): avc: denied { map } for pid=14792 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.100454] kauditd_printk_skb: 1 callbacks suppressed [ 2758.100463] audit: type=1400 audit(1536420162.379:26064): avc: denied { map } for pid=14796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.171035] audit: type=1400 audit(1536420162.399:26065): avc: denied { map } for pid=14796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.240110] audit: type=1400 audit(1536420162.409:26066): avc: denied { map } for pid=14796 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.310104] audit: type=1400 audit(1536420162.409:26067): avc: denied { map } for pid=14796 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.380096] audit: type=1400 audit(1536420162.429:26068): avc: denied { map } for pid=14796 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.431024] audit: type=1400 audit(1536420162.429:26069): avc: denied { map } for pid=14796 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.480091] audit: type=1400 audit(1536420162.469:26070): avc: denied { map } for pid=14796 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.530096] audit: type=1400 audit(1536420162.479:26071): avc: denied { map } for pid=14796 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.580097] audit: type=1400 audit(1536420162.479:26072): avc: denied { map } for pid=14796 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2758.630106] audit: type=1400 audit(1536420162.499:26073): avc: denied { map } for pid=14796 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2763.829655] kauditd_printk_skb: 1 callbacks suppressed [ 2763.829665] audit: type=1400 audit(1536420168.099:26075): avc: denied { map } for pid=14797 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2763.880103] audit: type=1400 audit(1536420168.119:26076): avc: denied { map } for pid=14797 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2763.930105] audit: type=1400 audit(1536420168.119:26077): avc: denied { map } for pid=14797 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2763.980105] audit: type=1400 audit(1536420168.119:26078): avc: denied { map } for pid=14797 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2764.030113] audit: type=1400 audit(1536420168.139:26079): avc: denied { map } for pid=14797 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2764.090130] audit: type=1400 audit(1536420168.139:26080): avc: denied { map } for pid=14797 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2764.140099] audit: type=1400 audit(1536420168.139:26081): avc: denied { map } for pid=14797 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2764.190088] audit: type=1400 audit(1536420168.159:26082): avc: denied { map } for pid=14797 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2764.240116] audit: type=1400 audit(1536420168.159:26083): avc: denied { map } for pid=14797 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2764.290115] audit: type=1400 audit(1536420168.179:26084): avc: denied { map } for pid=14797 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:22:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 15:22:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000021, 0x0) 15:22:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') exit(0x0) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18}, 0x18) 15:22:59 executing program 4: socket$inet6(0xa, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:22:59 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80003, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x88d6, @mcast1, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0x10}], 0x10}}], 0x4000350, 0x0) 15:22:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="2ede4db08670ee2e223db2f8b06bc7fadbeb8cce91666b40db987460572488cedff69409900001000000007c000072147d9e2c546d075b26fc105288566f7f1eb3d865264df2e3272aa42ba6040d4b162a83aaa9b119b8c532e0fcc5270a1de23892224c8cdf2beb8f3cb3f89367d6c68a35c594543f92085b22ee5e8df1d72255ecd993c80363459ee4ad5139ef2968ddfa95e1aa6e599e6566162b9cffcd1c07f919"], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) setns(r1, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000000240)) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f00000005c0)="72616d667300ce2ea004b0dbfa6471c51406c6178bded1c574556f2139dff5564dbb869886e2c12c899e014c5479e76c065a4747b0f09c69500f5cb866a0f2c4561265ac298648", 0x0, &(0x7f000000a000)) fchdir(r0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x10001000a00) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x401) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) lseek(r3, 0x0, 0x3) add_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000380)="9b072c058da128ee6124", 0xa, 0xfffffffffffffffa) r4 = socket$packet(0x11, 0x3, 0x300) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ppoll(&(0x7f0000000240)=[{r4, 0x14}, {r3, 0x10}, {r2, 0x4}, {r4, 0x80}], 0x4, &(0x7f00000002c0)={r5, r6+30000000}, &(0x7f0000000540)={0x8001}, 0x8) 15:22:59 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000006c0)={0x4c, 0x0, &(0x7f0000000600)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000005c0)}, 0xfffffffffffffff9}}], 0x0, 0x0, &(0x7f0000000680)}) 15:22:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:22:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/snmp\x00') ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000200)=""/156) socketpair$inet(0x2, 0x7, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r3, &(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x4}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="200000021800010000000000000000000ac00000000000080000000004000800fb22b04eb75b47852729b2"], 0x20}}, 0x0) [ 2775.411037] kauditd_printk_skb: 12 callbacks suppressed [ 2775.411047] audit: type=1400 audit(1536420179.689:26097): avc: denied { map } for pid=14808 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.490095] audit: type=1400 audit(1536420179.689:26098): avc: denied { map } for pid=14808 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.523860] audit: type=1400 audit(1536420179.689:26099): avc: denied { map } for pid=14808 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.560931] audit: type=1400 audit(1536420179.689:26100): avc: denied { map } for pid=14808 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.601817] audit: type=1400 audit(1536420179.689:26101): avc: denied { map } for pid=14808 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.660087] audit: type=1400 audit(1536420179.729:26102): avc: denied { map } for pid=14808 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.728897] audit: type=1400 audit(1536420179.729:26103): avc: denied { map } for pid=14808 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.795036] audit: type=1400 audit(1536420179.729:26104): avc: denied { map } for pid=14808 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.850477] audit: type=1400 audit(1536420179.729:26105): avc: denied { map } for pid=14808 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2775.904256] audit: type=1400 audit(1536420179.749:26106): avc: denied { map } for pid=14808 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:00 executing program 6: inotify_init1(0x800) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000000)=@req={0x28, &(0x7f0000000240)={'tunl0\x00', @ifru_settings={0x100000001, 0x159, @te1=&(0x7f0000000200)={0xa30, 0x100000000, 0x91d, 0x6b3de81e}}}}) 15:23:00 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) shutdown(r0, 0x1) 15:23:00 executing program 6: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="20000000010500000000000000000a80df64f1ce8105b659bc01515fe4a0b639dab3dd7ba5f504acd7e55423d0"], 0x20}}, 0x0) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x1}) 15:23:01 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000001000000000000000000000000fbffffffff030008000000000000000000000000000000"], 0x20}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000001c0)={[], 0xffffffff, 0x70, 0x0, 0x6, 0x40, r2}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0x80000000}) 15:23:01 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040), 0x69, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) [ 2776.902573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14831 comm=syz-executor6 [ 2776.919712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14831 comm=syz-executor6 15:23:01 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffc) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:23:01 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x17) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x7, 0x10000, 0x1, 0x22, 0xffffffffffffffff, 0x81}, 0x2c) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) socketpair(0x2000008, 0x4, 0x0, &(0x7f00000004c0)) accept4(r0, &(0x7f00000001c0)=@hci={0x1f, 0x0}, &(0x7f0000000140)=0x80, 0x80000) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1404402}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="cc00000000000000000400000000b89c00000000", @ANYRES32=r1, @ANYBLOB="0e00090006000e0001000f0008000d00400000000c0001006772656400000000940002000800040001000000100003000700000007000000010208000800050001000000100003000d0000000700000001081f00100003000d00000000000000000804000800050000000000100003000f0000000a000000000609003800010000000000b40a000009000000100000000500000001000000080000000800000008000000040000000b1d1c040100000004000000"], 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 15:23:04 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) pipe2(&(0x7f0000000000), 0x800) [ 2780.901217] kauditd_printk_skb: 101 callbacks suppressed [ 2780.901226] audit: type=1400 audit(1536420185.179:26208): avc: denied { map } for pid=14853 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2780.960215] audit: type=1400 audit(1536420185.209:26209): avc: denied { map } for pid=14853 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2780.999496] audit: type=1400 audit(1536420185.209:26210): avc: denied { map } for pid=14853 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.070088] audit: type=1400 audit(1536420185.209:26211): avc: denied { map } for pid=14853 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.120087] audit: type=1400 audit(1536420185.219:26212): avc: denied { map } for pid=14853 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.170075] audit: type=1400 audit(1536420185.219:26213): avc: denied { map } for pid=14853 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.230082] audit: type=1400 audit(1536420185.219:26214): avc: denied { map } for pid=14853 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.280105] audit: type=1400 audit(1536420185.229:26215): avc: denied { map } for pid=14853 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.340148] audit: type=1400 audit(1536420185.229:26216): avc: denied { map } for pid=14853 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.390084] audit: type=1400 audit(1536420185.259:26217): avc: denied { map } for pid=14853 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.630647] kauditd_printk_skb: 1 callbacks suppressed [ 2786.630656] audit: type=1400 audit(1536420190.909:26219): avc: denied { map } for pid=14854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.690098] audit: type=1400 audit(1536420190.929:26220): avc: denied { map } for pid=14854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.740104] audit: type=1400 audit(1536420190.939:26221): avc: denied { map } for pid=14854 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.800090] audit: type=1400 audit(1536420190.939:26222): avc: denied { map } for pid=14854 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.850087] audit: type=1400 audit(1536420190.959:26223): avc: denied { map } for pid=14854 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.900101] audit: type=1400 audit(1536420190.959:26224): avc: denied { map } for pid=14854 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.950095] audit: type=1400 audit(1536420190.959:26225): avc: denied { map } for pid=14854 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.000111] audit: type=1400 audit(1536420190.969:26226): avc: denied { map } for pid=14854 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.050134] audit: type=1400 audit(1536420190.969:26227): avc: denied { map } for pid=14854 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.100125] audit: type=1400 audit(1536420190.999:26228): avc: denied { map } for pid=14854 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:22 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB="852a627300", @ANYRES64=0x0], @ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f00000000c0)="06"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x5, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1163484001"], 0x0, 0x0, &(0x7f0000000480)}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 15:23:22 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', r1}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:23:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x5, &(0x7f0000000240)=0x0) syncfs(r0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB='\v\x00\x00\x00)\x00\x00\x00\x00\x00\x00'], 0xb) io_submit(r2, 0x0, &(0x7f00000001c0)) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x7}]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 15:23:22 executing program 2: chmod(&(0x7f0000d3f000)='.', 0x5398fffb08fec7ed) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RATTACH(r0, &(0x7f0000000380)={0x14, 0x69, 0x2, {0xed, 0x4, 0x1}}, 0x14) syz_read_part_table(0x2c8d3db9, 0x4, &(0x7f0000000300)=[{&(0x7f0000000040)="b20a4a867f9c498565cf34113136e17db86383724fab9f74e5bc08cb588a9682d390347e208cfcba20546382150e5bb08d9133acbbfc5442b810a309b86502a64250c803ec97a7ad8942203b8ee80b95d2599b12ead522153f9f2e6c660c1b8a1fa211ad153817f22bcd6e16", 0x6c, 0xfffffffffffffe76}, {&(0x7f00000000c0)="03567a1f81b1b4c11377a599869f7fe771ac9ca2462afc5b737c065161d36f75e56646fefc457a9e282c29bf4d3d0edaa147c26595ef1f670f85088f594eee088e4a11048491862cb810c091c9343658c6ee3f53b77a48dec00bcf6e05c7a0d36f44fec48c13855124234446da303ddb3b34b707daca237a58f717baf69cccc00f08c48b8073499158c79d08a355d5b656a0429c0594176333a66bb2889711055205be8dcf426feb17e5b8f3570d03457aa51890a1b578d5d3819d98c1385a297b40", 0xc2, 0xd6}, {&(0x7f00000001c0)="7d096af0c4dc0919959796dbea2fac7779647bfef826b790d01c3e5aa7398a3e7950dd35b5d012e9cec36fba09e276fac2d93a91281f661edf42abdb76abc0203fd94b8b9dd3be081c1f3f26bd543d5db5c08c495f5236ece5e318d2537b9760c8a59cd9c5a9351036e0a205dac1b370fa84450968d4ae8f3df3dbec52ce9b4b6e97b79fbcbcb92620917dd351819d06323ca2a296020dc2f4838358a932515caf9a3d60c4c8f9", 0xa7, 0x6}, {&(0x7f0000000280)="bd6571b1a0638dbc3533949b365bff9835a0883172e3c76472dce258502082efee1928aecc73980f4a6ed167dbe29d4a5bb092bd181849567f099101545137694e80159a6bc2b796d440a155010b2f32ac3d2953198c3acf8eb920bc7df33ae09b19d0e1d8bd", 0x66, 0x1354daaf}]) 15:23:22 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0xfffffffffffffcf5, 0x3e2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x7, &(0x7f0000000100)={0x0, 0x1c9c380}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r1, 0x80047456, &(0x7f0000003000)=""/174) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000180), 0x4) 15:23:22 executing program 4: socket(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x3a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaa0aaaaaa4e80c200000008004900002c0000000000009078ac1314bbac14147d130befac2314bbe00000018903000000000090"], &(0x7f00000002c0)) 15:23:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x7fffffffffff7) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7b, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002bc0)=""/4096, 0x1000}], 0x1, &(0x7f0000000240)=""/113, 0x71, 0xf00b}, 0x2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000680)="27dab826d60b65e77bddb67a5326c70e8567615435079faee91000c03d99c9288fa323fad93af9478d416115c2c1361d805c0d8daabe12b7dcbd3da159bd05a6f3d8817a5847576a786bf68d75f73730b6b2f65f469ecf692073c818a549f16c5349", 0x62}], 0x1, 0x0, 0x0, 0x40004}, 0x44804) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000002b80)={&(0x7f0000000400)=@sco, 0x80, &(0x7f0000002a40)=[{&(0x7f00000000c0)=""/40, 0x28}, {&(0x7f0000000740)=""/84, 0x54}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000480)}, {&(0x7f00000017c0)=""/171, 0xab}, {&(0x7f0000001880)=""/187, 0xbb}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/204, 0xcc}], 0x8, &(0x7f0000002ac0)=""/175, 0xaf, 0x1}, 0x40010020) shutdown(r0, 0x1) [ 2798.461093] kauditd_printk_skb: 23 callbacks suppressed [ 2798.461103] audit: type=1400 audit(1536420202.739:26252): avc: denied { map } for pid=14861 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.517873] audit: type=1400 audit(1536420202.739:26253): avc: denied { map } for pid=14861 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.572229] audit: type=1400 audit(1536420202.739:26254): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.624220] audit: type=1400 audit(1536420202.739:26255): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.675676] audit: type=1400 audit(1536420202.769:26256): avc: denied { map } for pid=14861 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.730105] audit: type=1400 audit(1536420202.769:26257): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.811303] audit: type=1400 audit(1536420202.779:26258): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.875802] audit: type=1400 audit(1536420202.789:26259): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2799.140109] audit: type=1400 audit(1536420202.789:26260): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2799.190105] audit: type=1400 audit(1536420202.869:26261): avc: denied { map } for pid=14863 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) listen(r0, 0x0) socket$unix(0x1, 0x7, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 15:23:31 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000002c0)={'veth1_to_bridge\x00'}) pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) symlinkat(&(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file0\x00') ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000001c0)) 15:23:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udplite\x00') write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x7) 15:23:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/11, 0xffffff9e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 15:23:33 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x488b00, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) preadv(r2, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f00000000c0), 0xfffffffffffffcd7, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYRESHEX=r1], 0x1}}, 0x800002000000000) [ 2809.457619] kauditd_printk_skb: 26 callbacks suppressed [ 2809.457627] audit: type=1400 audit(1536420213.729:26288): avc: denied { map } for pid=14873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.540095] audit: type=1400 audit(1536420213.759:26289): avc: denied { map } for pid=14873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:33 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000005800010587ebb8f7b49f5733dce1d4033d0000000000001600080000000000000000000004000800c4cf07a76d8d606f6ea6d136b65a13846b99873000000000f270c84afc2a4e7fbbc9b832b60000000000000000000000000000"], 0x20}}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000003c0)=""/244) [ 2809.690340] audit: type=1400 audit(1536420213.779:26290): avc: denied { map } for pid=14873 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.760108] audit: type=1400 audit(1536420213.779:26291): avc: denied { map } for pid=14873 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.810088] audit: type=1400 audit(1536420213.779:26292): avc: denied { map } for pid=14873 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.850690] audit: type=1400 audit(1536420213.799:26293): avc: denied { map } for pid=14873 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.876824] audit: type=1400 audit(1536420213.799:26294): avc: denied { map } for pid=14873 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.902502] audit: type=1400 audit(1536420213.839:26295): avc: denied { map } for pid=14873 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.927096] audit: type=1400 audit(1536420213.839:26296): avc: denied { map } for pid=14873 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2809.951610] audit: type=1400 audit(1536420213.849:26297): avc: denied { map } for pid=14873 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) 15:23:36 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendto(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000180)=@nl=@unspec, 0x80) [ 2815.269730] kauditd_printk_skb: 1 callbacks suppressed [ 2815.269739] audit: type=1400 audit(1536420219.539:26299): avc: denied { map } for pid=14878 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.320172] audit: type=1400 audit(1536420219.569:26300): avc: denied { map } for pid=14878 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.370903] audit: type=1400 audit(1536420219.569:26301): avc: denied { map } for pid=14878 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.433040] audit: type=1400 audit(1536420219.569:26302): avc: denied { map } for pid=14878 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.480148] audit: type=1400 audit(1536420219.599:26303): avc: denied { map } for pid=14878 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.530109] audit: type=1400 audit(1536420219.599:26304): avc: denied { map } for pid=14878 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.580089] audit: type=1400 audit(1536420219.629:26305): avc: denied { map } for pid=14878 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.660130] audit: type=1400 audit(1536420219.629:26306): avc: denied { map } for pid=14878 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.720078] audit: type=1400 audit(1536420219.629:26307): avc: denied { map } for pid=14878 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2815.770083] audit: type=1400 audit(1536420219.659:26308): avc: denied { map } for pid=14878 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2819.775401] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. [ 2819.853359] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 15:23:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2820.492527] kauditd_printk_skb: 34 callbacks suppressed [ 2820.492535] audit: type=1400 audit(1536420224.769:26343): avc: denied { map } for pid=14889 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2820.570098] audit: type=1400 audit(1536420224.799:26344): avc: denied { map } for pid=14889 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2820.640107] audit: type=1400 audit(1536420224.799:26345): avc: denied { map } for pid=14889 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2820.710097] audit: type=1400 audit(1536420224.799:26346): avc: denied { map } for pid=14889 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2820.780153] audit: type=1400 audit(1536420224.819:26347): avc: denied { map } for pid=14889 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2820.850106] audit: type=1400 audit(1536420224.839:26348): avc: denied { map } for pid=14889 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2820.900105] audit: type=1400 audit(1536420224.839:26349): avc: denied { map } for pid=14889 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2820.950111] audit: type=1400 audit(1536420224.849:26350): avc: denied { map } for pid=14889 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2821.000101] audit: type=1400 audit(1536420224.849:26351): avc: denied { map } for pid=14889 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2821.050101] audit: type=1400 audit(1536420224.879:26352): avc: denied { map } for pid=14889 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:53 executing program 5: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) 15:23:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a800000000000080600000004000800"], 0x20}}, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 15:23:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x44, r1, 0x210, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x530}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004) [ 2829.172219] kauditd_printk_skb: 1 callbacks suppressed [ 2829.172228] audit: type=1400 audit(1536420233.449:26354): avc: denied { map } for pid=14895 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2829.220397] audit: type=1400 audit(1536420233.449:26355): avc: denied { map } for pid=14895 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2829.260859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14899 comm=syz-executor6 [ 2829.305643] audit: type=1400 audit(1536420233.449:26356): avc: denied { map } for pid=14895 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2829.402565] audit: type=1400 audit(1536420233.449:26357): avc: denied { map } for pid=14895 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x280000, 0x0) execveat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='em0\x00', &(0x7f00000001c0)='^#/@posix_acl_accessmd5sum\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)="215d65746831280e29637075736574405d5e00", &(0x7f0000000280)='\x00'], &(0x7f00000003c0)=[&(0x7f0000000300)='ppp0trusted@\x00', &(0x7f0000000340)='lo\x00', &(0x7f0000000380)='\\security*+vboxnet1wlan0-systemtrusted#(nodev,@+\x00'], 0x1500) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2829.530106] audit: type=1400 audit(1536420233.469:26358): avc: denied { map } for pid=14895 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2829.601032] audit: type=1400 audit(1536420233.479:26359): avc: denied { create } for pid=14896 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2829.667654] audit: type=1400 audit(1536420233.479:26360): avc: denied { write } for pid=14896 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2829.717841] audit: type=1400 audit(1536420233.489:26361): avc: denied { map } for pid=14895 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000018000105deffffff000000000a800000000000080000000004000800"], 0x20}}, 0x0) [ 2829.780605] audit: type=1400 audit(1536420233.489:26362): avc: denied { map } for pid=14895 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2829.890102] audit: type=1400 audit(1536420233.519:26363): avc: denied { map } for pid=14895 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:23:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x2, @loopback, 0x16}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="7badd73b7802512ba39c031a824cc44b41afeb5ae442038b9d62d1bc16c0ef598fb53cf6234689309e0488cebc0e0bddd10baa56e624f68e628063ce715080d606f7216726bddc75b053039309ef986bea626ca58adae6011fe66dfff66d11f9564c56e73488bbe4c889d0ba176e7679ebd106679b74ac3b453d28dd95eafc024d1e4bd65825dc106b1c7446b80cdcb320224382c8adb0b78e1c7fc3f89a97a97657037874a1b6963918fd74d913ba949fc9747b911531a73222cf863eb6faad6a4f98da68d3ce6de7a39c14889859d3364ced97f370aaff", 0xd8}, {&(0x7f00000002c0)="67ec5f2b258f7e44c3a3e0ff3e00df55326dea499f38eac6fcf73f565208f5e2a7cac2a41edf811047821abc19939579d2a305eb8646b1f97ee5f9f122cd3c0c66353fa74588d4d47a87aea701da43242b", 0x51}], 0x2, &(0x7f0000000340)=[{0x1010, 0x19f, 0x9, "b0840c0a90805a2ea4054cb59d422026c7c4f7f21554ddbb050afa7b4d1a50beeca1ea155bb4a9c4060fddd80cbe84ed6f6ad34f7f081e21878104b052d63e4ee8dfd8d3370bee436af111b9c318e7f9035a497fcd44e2c62dc1ff7abbcab0c2f59d80b881bf18b995ee9663dceec1d4340f4494d3587d3dbb10b7f7470088a572f9f217149f79f595f4a90b35f3af1ad9e12be9f4ca46aff5eeb6dfdc03e17efde664dd2ee6a853cbea9c14d5aeee9c8d9b63ca038da2acb9a7cdcee73135a7c66a9e9437fe62afeafcc9b57f14bf3991e1911756b2e8f02fef56b0349cc1ac5e90fdb0580ddb7bbe2c2c34354bdbf6a896e3cf8747f55e70ef09fb000500a7220b5acbf7054b7bf72755a7511a9345ba500573e62d4a1a0a548ce9cd305892ff4371cf2d8d562fe6a9a6fd96cf6715092e50d67040f6ac4fa472ae95237e7446fe200f45a24ea85225868c7f0fe5492cbaea83291e30e5d1cc717587356968cf09516ae7f302bf3cdd15020dc5b9492ee000ec5e0c99febbb5d50362d25cd3ce8b5b9b7c07e13821849988b15f6eff1f5ecaf87eaf132630db31d2e9cadeac1d270077c04df023bf600b2b25950fbd311d08a860f794590b5a071cd7ce49854504f36642782f5942f3bfcb42c145f03c6533120fc91494561d1e993bbdcab9e7fc312af2bf85b65e1693f2c5bd341b8095ddeb484c7d867ae40c7e9c21aa071c381527922b28f59d71ce5e2e6df04a465bf621c8ee45a2ce001d374f1bdd37649ad215ba694806349de905bc7136441945f46b4d13874751b4e6b264cb0f0e5b92032550f8ee9eae2ae796dac2a5c520fb7c8657ff2a85832b74d23eed1695cd39c47b03844dd5ea1d810fb7a85c312cc7fc66bec5af08c93659621d5e83a6ea19f65ca008d1a00e988ee1c1e7c0cb3ea1dadaa49a2968ba2534eb5ef0ad57def83102046df37d174294f5ebd1c3e10666a7cdbca3131de5bfdbc6f5d658055bb2d68a6778b02a47a1bde40b99a27e958a98c6bfbfb5eb69faea07cccb67b7e92e7d48b189bea9880029548cebd8a49b12e626f5396e7aa515f670f6a63b3101e5720cd2f1a0497117f9e22c8abd38a27f0219b534d8e19d6b3fb68f6315b7b4e5ef2e202a9e309e97b59c4b0e556e18f6b229c7a35a77f58b4e1ea27e1d95d516f64d78298f45747ee91bfe3fc2b8a53e618b6d46565f8eb726e79cdb6ac7d07bc7738ba37b21acd8d3c6edd132d0e6d2acaba94e9f582976074f3f103a5b749e972af415f495b27034ef3284748dd43bef669d97b4204580472305405c07c95eb1207df3427b8e40b2b4fa4439da11c97b5b213552c54a88b71c2a553993eb57d18ec1bf6250fbfac1e98baf2087e55c9e349701776cdf1ca520b7676c7109f02614cea0f8d66f02829c663aca8616b427fbf8c5afee85b9d3121e6a97f6cb9b8aa673e55c2edbb0401c0505646d4f0a8dd203674aaba37934d1b07610033c95e64591e58d1ad45c378277d554521ce8f8fff734bef54dbd30f15a16c83c6b4a20a4e84c5ab88e887e14dbd6999e2ab2023e99f6b00a2a81fc853da947def0ba66f3b6953bf4d15d1554558d25b123c79c8f62d1454922ca0f22e2ca09966ab8e86614f155d4f5137cc4c0765553a06909e53d7b5d4649982398ba4292d01fd7613f5f8c36634b2c1721e6aa057c0346e4081fa778c5a60213f0a110d90713d5447fe06e0b3ce3cc986fc48686655be8be905370c72b87555dde480e550ba0dbb83f3c68a285056dfe66087732ab12e3cbcaaff709b2fca4eee18c1491a87f47b72c68eb43c63119afbfe4e24c9e5d7269474a860341eeb67635f25e0bbf1f2594f54bb491924d615d3f6b53f4a58dd55ca60546d0f715bf64034dde8d3e809931aa89b5de46f67611bcdc32ba634f517015dd57c7ffcd84f974bb16089a839dbed42f393f21222363290ffae1e95ef2d31c288e76d85f1113a5b86a44da9613f5bcba0101e4e0d8675b313738228c1ce1af096e694b5f44311e42de0b2a6a96b6810ecdc1d2c432b421d87cfa370e8162ce85b5ecc41b7114b3fc5072d6f8cab970ac9ac9259d79c900c2d4e1bfd9bf81edcd80c635b3ea1bd880ffe1fb03f212b2a547067a9cbb448f63bc9b2a47904255d6f189e7064d9104a7647ffc09c40449bef27397f3ae58e925c5eea371fba3d861bbb08d4fe935d9141e7538f62e002b06acd6fe3cb0a001e513e5f01bbd592bf7c22071aff28214a6d8c4fe95b4ea2b46fd1d40f9975bcb3d1865a3f2a895296f38a46300ca893027742886ffd9f8e3fa3a86a3af0da0fe7a1f8357a4106fc13b7ae5e39a56f514a01ffe1e7f44386401b6a94b3596948b7b0cbc61c38e12ecf079f64fa210c9c172f974a36cadc1c9fc6327f7d4de580cf5db7c36dc6cd55077bed7eb53c1b7f1ca1f5beaf275751963c1aabd2131c569402201959d94591c41f1e4ecefad9caccacb6a4c77c12695df2354bc482faedc4ed55382640cd7502e028e5012c054ffd1f58cbb02a8cfa1e10d54d4131d6e77aeace18242edcd23f136b7199a069ffafaffcd0278b67b83476cf79359e758fa609b83d121b4bf549cced85d53998fe8103a1e86ccd3fc9594994826deae598a8cd983d7e1617f992350b01ae4e879e8dfcfc1e5ebaad4fe15b3ffd67daf896e12741285f968204269fe7c745a2643935d85dea27d3906ba76cc0c3245f895606894c48cf3dcea3dabd1adbe0b9a99e26a084a3dfaf4389ba2cfc0edc6b3cda6f32c5dc3f5dcc29f21c362f47ccd521322fd7600d39a41048ab7e0f90fb7ebc6ecac09b9ddc5919da8da9a09cf35d77dd485fc98a89351141d42d6c4c45609cde403edf76959712f04486eb401794ef0bb5affbd181b8ee61eefd45282c7e12c7ccc2d9b3c64765557cdd1704528d16bc82083d94cfc5d79bebb5c5593630761cfdbbea6c1f9a449030ea1aa7e75c0d9f9429787c33367649ba24874199829f2a4ab6465160f29d3861d804f7370b200ee0cd58c9ce6aa3d8b96e7a3c83dd29faece7233e08e8336b9c5404fbfb2899e8c88ac09b4fa9327ee40fcb824fa2728a64276f960d665fd7d963dbc24c70d3c382c925a40de07313bc911a7566765d7fad0ac3de6901ea8d44732c0b74fe4f51b1cb35c9deebfbddaa76712021ccccd32a6551b11425c7c7f6f9a7b5004cb8be6eacb88fe152992535126d0a063c1528991e6c027bb80428d149178d58e177bc658a759a42a236d932b4042925a8543cc3890dc2aee6c06a5f5db28143ab9ac4cd7b71f11b27eda17018bf3a20b91118ec9b6216da6189f6ba2a74b032f0fd12d39283668e78f846c58cbeada2c520eaf4cc4fb949b84956729f25b346d98fae83166660ee6b10be0dbf2946ce2e760add08e187a690a9b7443b081aa6838cc9e7bd0ebe95b11cba3b1599a3718acea3a105acdbd744e2ff6c79e5051b3e23763c5c943cd5c6cf997c6bd1c6a7d529a15bb0474bcbf772a81ece3f68fd04f45a7bbb597e8ba8f335bd41daf7041bef7692da2adc4be3029bb561cc13846b029531149d25417fdd2498ba2df73e6643320ab76be64e953d5640110316a3a452b5bd4cee1b4605723114d01572ca2340ba8231c9c3667ca4431f620bc0fe56da841433863776bf2f6bd85efebdf0000a559559194e4a25026b4b20b5a28798865978b625fb4beba35e141676ba20cfdf3d51b319190da1794ccda0ccc63281d0d68af09dd172382a2853c7c7523169a14c715cda3cb853c09d9b24c38bc3e4eb08130a9db14d7e3c857d09944e5b1ca07a85d2292e58ea415d9455cd710f7f1a62cd1971e0124d9ead23f3cb8e97aa687e3c72bdf53f730f2171716318d1c7e40a6eb48a05a66fd02c16990ac33616ffe141aee96256bf049f99c23dc62fae04a7f163757a758e51f6ab80e40bb606e566cca0aa9a9ba157b698747c7a781229d60b305b79c6c1b8e9e76a86798d01140fb0712b471d3082c6a430eb9a710974f285b80b98af524a4ec980822d8dbb2a04e965e49a6d3e87166580140efab8be78f24de90aa0e35a378da82acbee9cb12f67d4b8a1a3400484973b93cfaba87c44c7c74d6bcb447abc00d1c9f26e86cea46f98b34cb83292798606591afdcc3e6ec7e35de55495f530b65a5ee434e50dc7a385217822c774e6bfe1c9c73f583f741d0948b7a7512116da42f36046205a0f2f1cd2cb986b94014c59a712581758eb9492e39c5040211ce0aac8313757d2b113504c20a6502724672ea3a146b2e0d7ae406d8f2373694fb52375bf40fe51a5adae4f4cbf688dce6080860f49e97d21c350dd80615b4ac4226a4b245f91b38586528c27614979c7a826c3837e816b9fcb09efa6f0107640088f37ffb6507007dcb084477bb1ee0fa08594168890406b29869b361a4a631fd0937742654dfac9206e34379fde39aa5890cede6041526e6c55e00ea725712964bcbe5df2ec62fe86819aa3d86f878a1e0c92c859491ad2d7f5c029fbe7ae6ad884b4591b0811d3c7e121a81a570130516bfce67ccb3e767dc9706d53c625890d36abea870e9581272622465910adeeb7a71925f22706e4ffccfe54f3c293f7d913abd87bf953ca386edfabe010ddcc31a4269c16125ff5cba10189aed2d5a42dfb6d0ecdf73d66a9c77eb66964d10d9572a4852e6b511ecf2f8e619a4e05a1b22c1f2da9a257b9a471561cf3608ccc4585731cec33ac124a0068328741759060a2ea099a7e72ad3ea47c465604b00012464567adbb08717b422b09c5dda8898094915a1d7df71d0bc41126d762010b945d0dff548f1405f98bd80b0958c82104df0a4bef844102ef97ad0d3f39ec256a40572f6767eee8b6822a4a0622ae511aa03a2073835e0448cc903d68730e13eaec83bf01c9711411a0ebd28b649e8ee88c27eb833deaa64b266b23bd685accc4a0f6479303435d587481ed8ac3ccaeb081a977bcb0cb767db309a687963c1a0e222ea9a4ba682bbd96543441e551841690986b8113e9f37aed19245113c99585f7b29c570d6b4a7fe28f16178a8bbb4088e2eaa5887a803b91fb26cd3e5f520b693e6735029dec5c880db65d247d6d671db6ba64bef4bf7286211e82be65dcbf045430cc8b4610edac339fc9cf44652387f59665ff50b61fba9eea6253ac191a1693db339aafba6dd944727212262375df716d811814aa6875a3494473207047d85288dd4b140c1cdf3e9d1da589f4a492400d8fd77fbba94ac995fbf4225ed6aeb6c2b0c3ee778ad3f2aa87db92deb7623ee8fd0c92a18245e88ba0c50ee72fa75a882ce5ac56fc2b2512593e81bf8972fef933f5f1c9dee3286a4d125deabb5349f2c0c793a36c4decf59e35f1149eb27b39a1b68e300cef3e6e9b4315b2f013770526bf8a57cceb5a7cfa869cc6cc31e249aaec8e92709238d836b579336269aed501bc7d7a4d29e6fee951262865b731ba6098dcd65b2c23fdd73ae0bf119da9ccdcb4a4c050741fdfe1685293c81c132227f9f1ffd85c62ad04aaccd9d7c80d2401b71e2fd59e1c292878055e4529344d8d9b44442bc3f647e2feee7bb8f8fc6d913d3a5eaac0b83a9aba03812321e1fcf74fe852b0891594a1cda59c4afa09edb89848fb0dd4449f73a47da2e36808d440b7d0ea4b9bfada1c88d7373bb551937801128c2d5a40e1d478e613c629f34a0c6df88beea938644c4553ec0fd0a2665112eeb85bf92d2e8cfb63688ae573cd861ecbdc6ffc8b45789c59ec0112718d0322daafe0f8b1c"}, {0x68, 0x11f, 0x4, "e281f07e545435167c279754cfe39d706f28fc3ac035439c50bd15b95dd32fb2d46d07e85257b245a9450e674d8b48a6caf5065d328cf074faa092ad0b6b82fbd79a870e3aafde88b8aa86a2f934471e257727a2780561d5"}, {0x60, 0xff, 0x7, "95787da00b7839079401b7790cc397a436c606c55896fa3512c95ecace4dbdf3af8f096b2957762be884d50d5fee428ef53f632d91430906fed194e68a59cbeb6e31fcd97c987434c6ee0624ec38"}, {0xe8, 0x0, 0x6, "2e2bb8cbb7b01d0a3956504e92dfc28b2c085207a055b1d464619c639f88e5fee323dd0de87f3159f2912af4a4a1741b83481649646b0529703211b7b015e400b6e9995c45ce5c984628ed210f1a599b02befff6861f0b34a68367704ccd466bbad7b4ec818ca3f5cccd609ee1f8d0f0ea21339809f491a4c7eb4763a09e6d5de029cf308c1699b0debb8f8dbcf2ac6bf2fea6b1e751b07e692f78071ca1a7dc45346ae25b5042b3fa92fa0c3c876f19fc47f29f68473a8cf9e3a7db04fb7f94e01022ce1d2ccf037418e5d1f7de3333c8"}, {0x100, 0x11f, 0x4, "ea8999ab87a3d393251812d8a10c01aa1215492270b4923f6c1b5e73ee87e02b10dc4d0d7b3249e02b9c7f17bdabe6546031ab41fe5eb564bba0b3e5f68860c5fde15aa107d732a9e70a1e813cf5274f2884da6ca86cbdc6c47b512cd90523db22025f8ec625ed1d2bb2cb39c0842b6c6bfd3737fac21f1b736bb68db74f5e72b98d3cc99d88b570b292786ad9a6304ad76cd1cc059f71411e76dd9c8497278f500cc94b0df05e08bc46fc50b0e623b2c5862d12577a2e9ba2b64d1159af71ae729d102314030acad2a1fdbe84ae1d99c93e3115180853cb783eeebac83ea88c4585d35a1a21523cb542744b"}], 0x12c0, 0x48800}, 0x80) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x7) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:23:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffe) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x44, r1, 0xc15, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffffa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x81) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:24:00 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="6319c5bfcb5284b0ab5609d204ac6f080400264950926a30c234f134c10b4218687939165933f7a5dc8060982e4c25a56a81fc7ab602584d114ae6c705059e7bf681e4180acc7aee046492495c451df514b43ad5d303beab695c69fa9442f92d11eec0dd8e978b87fbfbace79efeec1f7bcd242d4f64d64ed58814c52f7c312d42ca6758db6e438f56bf7141672b3b56c19495c9806e20fb29f00c3ed55945ea333fb9c70bd2e53aad870bb8262c2014dc3a1d9274780c793d33aafbe1f95f45ffad", 0xc2}, {&(0x7f0000000280)="2d7f7ee6593be004f8fab9d8bb7225558f0ef19edf2334c5750008055f5cc9b53414d770695f4c5f19e117a84c3551465093962a7c5c2047e1be3221aad2d0c4ff5df9d14dc3785d1a88671811295b201dc4dce4ce081d1d267cc88cb520976d6aa7605545341c813b372f9f25771316a1c821fbb8f14e62416024a480b5181ee57486222822ce", 0x87}, {&(0x7f0000000340)="bb728e1ab543ee02ab5de0e412a823cd7d860927eebd47fcc4753a5f224610d040693fdd00ff2c78a3122d12460c2aadef44d9a3c093264bc4272e18058c1074d0e7ab4ec37371c206501c2f451af744435fded86450d967f78e525d0b6b03ac0a7586b06cf8ec4d1858b8d365d901077133", 0x72}], 0x3) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = creat(&(0x7f0000000400)='./file0/file0\x00', 0x10) write$P9_RSYMLINK(r4, &(0x7f0000000440)={0x14, 0x11, 0x2, {0x10, 0x3, 0x7}}, 0x14) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f00000005c0)="3f02183249816095591a7e7c9fea83b91987316750e22bc0cc24f0994ce8649a04bcebeb44a202bca0b815bfd1e7a72963fa9b56dce0b711ced407b2a985273551e1c9948a48b3a143d8747765a9af4a91d569c9de3c7ce548494b5b2020241a82d60012ff49ff69edb4d1010ecd428bf1231801151c01e52ba99b2fdecebdd1758510030e98df7a4f777b04802f8d6d7d59abaa0355e8fe936e03cba4837c0a84d00f3be0b9879e44c0e32988") r5 = dup(r1) clock_adjtime(0x7, &(0x7f00000004c0)={0x8, 0x6, 0x6, 0x97ab, 0x2, 0x9, 0x7, 0x4, 0x7fff, 0x47d, 0x0, 0x2, 0x9, 0x4, 0x5, 0x6, 0x5, 0x1, 0x4, 0xdf08, 0x1, 0xff, 0xfff, 0x0, 0x200, 0xea}) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="dafa5704"], 0x18}], 0x4924924924926c2, 0x0) r6 = fcntl$getown(r0, 0x9) fcntl$setown(r4, 0x8, r6) write$P9_RSYMLINK(r4, &(0x7f0000000480)={0x14, 0x11, 0x1, {0x20, 0x4, 0x6}}, 0x14) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) 15:24:00 executing program 6: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x3, {0x2, 0x4e22, @rand_addr=0x42d}, {0x2, 0x4e22}, {0x2, 0x4e24, @remote}, 0x20, 0x1, 0xffffffffffffb4e4, 0xffff, 0xffffffffffffffff, &(0x7f0000000100)='syzkaller0\x00', 0x2, 0xf48, 0x4}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2837.154241] kauditd_printk_skb: 80 callbacks suppressed [ 2837.154250] audit: type=1400 audit(1536420241.429:26444): avc: denied { map } for pid=14932 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.210193] audit: type=1400 audit(1536420241.459:26445): avc: denied { map } for pid=14932 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.255257] audit: type=1400 audit(1536420241.459:26446): avc: denied { map } for pid=14932 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.320185] audit: type=1400 audit(1536420241.459:26447): avc: denied { map } for pid=14932 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.370139] audit: type=1400 audit(1536420241.469:26448): avc: denied { map } for pid=14932 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.420150] audit: type=1400 audit(1536420241.469:26449): avc: denied { map } for pid=14932 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.450523] audit: type=1400 audit(1536420241.479:26450): avc: denied { map } for pid=14932 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.476978] audit: type=1400 audit(1536420241.479:26451): avc: denied { map } for pid=14932 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.502800] audit: type=1400 audit(1536420241.479:26452): avc: denied { map } for pid=14932 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.528225] audit: type=1400 audit(1536420241.519:26453): avc: denied { map } for pid=14932 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:24:01 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='+bdev]}vmnet0\x00'}, 0x10) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x0, 0x3, 0x0, 0x3, "89a17b33ab35eed311c2ec4394881686"}, 0x20) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @remote}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) 15:24:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000048c0)={&(0x7f0000000000), 0xc, &(0x7f0000004880)={&(0x7f0000003380)=ANY=[@ANYBLOB="400100001a0011030000000000000000ff0100000000000000000000000000010000000000000000fffdff000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000003200000000000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480001006469676573745f6e756c6c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800160000000000"], 0x140}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)=0x0) r6 = inotify_init1(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000a00)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000b40)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000b80)={0x0, 0x0}) r11 = getpgrp(0x0) r12 = getuid() getresgid(&(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)=0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001d80)=0x0) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000001e80)=[0x0, 0x0]) r17 = getpid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001ec0)={0x0, 0x0}, &(0x7f0000001f00)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001f40)={0x0, 0x0, 0x0}, &(0x7f0000001f80)=0xc) sendmsg$netlink(r0, &(0x7f0000002040)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x400000}, 0xc, &(0x7f0000001c40)=[{&(0x7f00000000c0)={0x18, 0x11, 0x4, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x8, 0x56, @binary="88a6cc9d"}]}, 0x18}, {&(0x7f0000000340)={0x200, 0x10, 0x208, 0x70bd27, 0x25dfdbfc, "", [@nested={0x1d0, 0x45, [@generic="d1b0d8ade5bda988386e843c89836124ec698d95e1d38cc3d941c0235b805d4731b64ee286de91f4c5e1965bbbaf1904705d4b42d6c8139dc4ae484f32a744245540cfb827e58f3edf080d255d13a5003abe16f5cc2d377b182a7489c051f1dd6fc53d575288355141186b6928303da98c4041346af0a54a9b4683104018228244bc4ffe073759ad0b8f1ec6b82d9eabe03f748ff92085a657", @typed={0x8, 0x73, @pid=r2}, @generic="2dfa9f33dd4a9ce09b9c1bc4af33dac00587e6f1c2cbd8742d75e0fe156905064ab78c7ebe0dabb90b9430b22469339d2838c9e9aea3317172956c59859f005fe06eb992660cafeba0915793", @generic="56666e304e472a42abf41a9345803da517ce19d6a6a92c0caa6ac660b1b006f904a93530dd26da8ee4c9107a78cbfbe4c448e71cdda18e11c82328980f1388e4b8fa4755fa19633f06d58abb0a2f085f5119e6f5e24dcc968a3dcfa38e9a35a3efbe09428cad702663a6254235170ded46a0858c59321f00a82533613f005351b6edb01a8b793639f4147fda73b824d38c6a01becd530d424217479714dd1a14ed0b571b4c283fb8a9332e310543ee2c0d61b0966f1aaf7ae6f29f", @typed={0xc, 0x8b, @u64=0x96d}, @typed={0x8, 0x3b, @pid=r3}, @typed={0x8, 0x53, @uid=r4}, @typed={0x8, 0x65, @fd=r0}]}, @typed={0x14, 0x5c, @ipv6=@dev={0xfe, 0x80, [], 0x1c}}, @nested={0xc, 0x0, [@typed={0x8, 0x94, @pid=r5}]}]}, 0x200}, {&(0x7f0000000540)={0x218, 0x3a, 0x320, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x148, 0x51, [@generic="fed5402f0524b3a82c184218f6529a77a6c97c1e7d6f38228c4c17d3a3272c488ca4b199dab3f988f9cef8f04fad6afc06e9a164d64f8aac11f234c635e712a9603390e9938537ea48ed107dd21cdb9ca803f1a84d11fa3f2c2653bc222213686bc14d63fdcf9eff5b69815c18a0962101884d8975b73d45279be35eda4c984f9330a5622e7205e312a072734a2d62d05ca8ee95cd69c186822d6604fc28225b0175aaf1a5a076177a5817ea06ef4ea1cf87cd72c098bb119cfa6ade341cf791329d74cfd6f7511d097bef39218b38aac241671ac1ce534faefadaffc9e81abe49d8036ce223a31ba8e647fa7570", @typed={0x4, 0x17}, @generic="e33074f540cb3f1a8a28f735381b9ff8b30b3d45ff83dbfa3e47edad55e82fc46c701d50f588c9e73598d43d5211d74c5c5c26b37e3f7ea4c47300c4cadcb5979586daa777b32dfa7723bc257a187f"]}, @nested={0xc0, 0x56, [@typed={0x8, 0x43, @fd=r0}, @generic="e09ecdc75cf6ace12b55f5193174c7a4f5e03472776ea2b926227b34a84e329aea9e8428ef3515c8fdb3da0c66df5743f1e057cac44600b42e219db0b530d8e5b1589a5f477af2087f3ea82ab4639bd8cea81cbe4643f8689fe511ea374758b23721a3babc4b0e5a7eea8d088ba6a14f194b46e07f998cb1cfbe17135381dc3f182608a867e45b6bbcf1bc", @typed={0x14, 0x81, @ipv6=@loopback}, @typed={0xc, 0x6e, @u64=0x2}, @typed={0x8, 0x48, @fd=r6}]}]}, 0x218}, {&(0x7f0000000800)={0x1ec, 0x2e, 0x10, 0x70bd2d, 0x25dfdbfe, "", [@nested={0x34, 0x1f, [@generic="e45ad5a823560238522c7a24baf5fbf1abfe5ee7681b6f0c5c5a1e2d3de4a99cf3a4113c0b3790ecc36963a99a"]}, @nested={0x70, 0x1, [@typed={0x8, 0x61, @u32=0x9fc}, @typed={0x8, 0x20, @str='@\x00'}, @typed={0x8, 0x16, @uid=r7}, @generic="d7248f590242d324de7fed1c699c0571eb00f58db2323ad829119e1a5fe38f8aa16d5e74acff95f75fbc86199798a7aa121a326bba18a7332becb953c9c6ee812c6605a821eb9ec59a536eac640c7ec7bd"]}, @nested={0x138, 0x8d, [@generic="c3741517f90f191562d409c2d55e865a4b208240cf78c194d15e69d1d491b749", @typed={0xc, 0x17, @u64=0xeb48}, @generic="5f694b5a303bd087debd968b0b46bcd60e9a07ca4e1ea3601274ada088365cee1afbc03a0c3626561ca1370e0410665b723d68859632ebffea601fc0b12fd981f99084de352d0383ab3ef6724c7b35506b78e631afec342cb3780a185eb19390d384cfc67815e003210cd06e534c8f15d77e3ae763758123b1c4d8178365acd1cdf5188c8e2271f2a5dbe4c94bc85b670431695456281b0d9c890cbd1809b205d615ada646e9347c87acbb2e5f955a851e8012c2fe0a878af5b0ff537ef4101fdc1b3680069cf760fa9be99f6c8cbd6fe81bcae8bd9d7334b6", @generic="1cbfa885ff4e4167cb4d8377c37f216ce1d935ae8bcc751911ae1da549516e", @typed={0x8, 0x10, @fd=r0}, @typed={0x8, 0x4b, @fd=r0}]}]}, 0x1ec}, {&(0x7f0000000bc0)={0x105c, 0x3b, 0x404, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x2f, @uid=r8}, @generic="9314257a1fc1d806d7e9da5ece71a5ca8c85955883b6b15c45d9d64d", @typed={0x8, 0x33, @fd=r0}, @generic="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", @typed={0x8, 0x15, @pid=r9}, @typed={0x8, 0x2a, @ipv4=@multicast1}, @typed={0x8, 0x3b, @u32=0x9}, @typed={0x8, 0x84, @pid=r10}]}, 0x105c}], 0x5, &(0x7f0000001fc0)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}], 0x60, 0x1}, 0x24004004) r20 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r20, 0xc008240a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) 15:24:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x1, 0x40, 0x1, 0x0, 0x0, 0x0, 0x2000, 0x7, 0x8, 0x7, 0x6, 0x800, 0x1, 0xffffffffffffffe0, 0x3, 0x6, 0x80000001, 0x3f, 0x40, 0x8001, 0x5, 0x2, 0x80000001, 0x1, 0x5, 0x20002, 0x9, 0x8904, 0x7ff, 0x9, 0x5, 0x4, 0xf2e, 0x9, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x200, 0x100000001}, 0x31000, 0x158, 0xfffffffffffffff7, 0x1, 0x7, 0x0, 0x7fffffff}, r1, 0x2, r2, 0x8) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000000)="580000001300adffffff8188d2677700ac1414aa0b4824ca945f640014000500000000000010000100090a1000410694664883ce6f76f80400000000fcff0000000000000000000000000000000000000000000000000000", 0x58}], 0x1) 15:24:01 executing program 2: r0 = timerfd_create(0xffffffffffffffff, 0x80000) fgetxattr(r0, &(0x7f00000000c0)=@random={'system.', '$\x00'}, &(0x7f0000000140)=""/191, 0xbf) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@broadcast, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) getgroups(0x5, &(0x7f0000000940)=[0xee01, 0x0, 0xee01, 0xee00, 0xee01]) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)=0x0) getgroups(0x5, &(0x7f0000000b00)=[0xee01, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff]) fstat(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000bc0)={{}, {0x1, 0x3}, [{0x2, 0x4, r1}, {0x2, 0x4, r2}, {0x2, 0x4, r3}, {0x2, 0x2, r4}], {0x4, 0x4}, [{0x8, 0x6, r5}, {0x8, 0x6, r6}, {0x8, 0x5, r7}, {0x8, 0x3, r8}, {0x8, 0x0, r9}, {0x8, 0x2, r10}, {0x8, 0x3, r11}, {0x8, 0x2, r12}], {0x10, 0x2}, {0x20, 0x3}}, 0x84, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r13, &(0x7f000000b000)={&(0x7f0000000100), 0xc, &(0x7f0000beeff0)={&(0x7f00000002c0)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@rand_addr}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) 15:24:01 executing program 6: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x202100, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r1, 0x300, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x38}}, 0x8000) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x7fff, 0x7, 0x7, 0xb931, 0x2, 0x3f, 0x0, 0x96, 0x40, 0x351, 0x93f, 0x9, 0x38, 0x2, 0x80000000, 0x5, 0x6}, [{0x0, 0x2, 0x4, 0x0, 0x4, 0x3, 0x87, 0x6}, {0x60000007, 0xb17, 0xffffffffffff3a40, 0x2, 0x811200000000000, 0x3b, 0xffff, 0x7b}], "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", [[], []]}, 0x12b0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000040), 0x308, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0xffffffffffffffff) accept4$unix(r0, &(0x7f00000015c0), &(0x7f0000001640)=0x6e, 0x800) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000001540)={{0x8, @empty, 0x4e24, 0x0, 'fo\x00', 0xcccef9fcec4bfa32, 0x8, 0x66}, {@multicast1, 0x4e22, 0x2000, 0xfffffffffffff430, 0x5, 0x100000001}}, 0x44) 15:24:02 executing program 7: r0 = socket(0x1, 0x1000000080003, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000180)=""/116, &(0x7f0000000100)=0x74) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace$poke(0x4, r3, &(0x7f00000000c0), 0x100) 15:24:02 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4400, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) [ 2843.899916] kauditd_printk_skb: 57 callbacks suppressed [ 2843.899926] audit: type=1400 audit(1536420248.169:26511): avc: denied { map } for pid=14947 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.980105] audit: type=1400 audit(1536420248.189:26512): avc: denied { map } for pid=14947 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.020100] audit: type=1400 audit(1536420248.189:26513): avc: denied { map } for pid=14947 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.110119] audit: type=1400 audit(1536420248.189:26514): avc: denied { map } for pid=14947 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.180113] audit: type=1400 audit(1536420248.219:26515): avc: denied { map } for pid=14947 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.230099] audit: type=1400 audit(1536420248.219:26516): avc: denied { map } for pid=14947 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.280088] audit: type=1400 audit(1536420248.219:26517): avc: denied { map } for pid=14947 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.331067] audit: type=1400 audit(1536420248.239:26518): avc: denied { map } for pid=14947 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.390094] audit: type=1400 audit(1536420248.239:26519): avc: denied { map } for pid=14947 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.440077] audit: type=1400 audit(1536420248.289:26520): avc: denied { map } for pid=14947 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:24:11 executing program 5: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)='eth0cpusettrusted{\\!-#[\x00', 0xfffffffffffffffa) keyctl$revoke(0x3, r0) open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0xc3) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000020001ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000014d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007001700b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 15:24:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a80000058fa8c770000000004000800"], 0x20}}, 0x0) 15:24:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x440000, 0x22) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000100)=0x7) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:24:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x5, 0x0, 0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x100000000, 0x7ff, 0x8, 0x80}, 0x10) init_module(&(0x7f0000000140)='\x00', 0x1, &(0x7f00000001c0)='self\x00') sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000440)={@dev, @loopback, 0x0}, &(0x7f0000000480)=0xc) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getneigh={0x14, 0x1e, 0x0, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040040}, 0x40000) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000004c0)={@mcast1, 0xa, r3}) 15:24:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) connect$netlink(r0, &(0x7f0000000100)=@unspec, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101840, 0x20) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x40) socket$nl_generic(0x10, 0x3, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 15:24:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a80ff01000000000000000004000800"], 0x20}}, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f0000000000)=""/35, &(0x7f0000000100)=0x23) 15:24:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x1c) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x11}}, 0x0) r1 = dup2(r0, r0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x321) [ 2848.901751] kauditd_printk_skb: 58 callbacks suppressed [ 2848.901760] audit: type=1400 audit(1536420253.179:26579): avc: denied { map } for pid=14974 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2848.970138] audit: type=1400 audit(1536420253.209:26580): avc: denied { map } for pid=14974 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.070103] audit: type=1400 audit(1536420253.209:26581): avc: denied { map } for pid=14974 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.140880] audit: type=1400 audit(1536420253.219:26582): avc: denied { map } for pid=14974 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.190076] audit: type=1400 audit(1536420253.219:26583): avc: denied { map } for pid=14974 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.240075] audit: type=1400 audit(1536420253.379:26584): avc: denied { map } for pid=14978 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.290077] audit: type=1400 audit(1536420253.399:26585): avc: denied { map } for pid=14978 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.340098] audit: type=1400 audit(1536420253.399:26586): avc: denied { map } for pid=14978 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.390082] audit: type=1400 audit(1536420253.399:26587): avc: denied { map } for pid=14978 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.440082] audit: type=1400 audit(1536420253.429:26588): avc: denied { map } for pid=14978 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:24:26 executing program 1: 15:24:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xfd3c, &(0x7f0000000100)={&(0x7f0000000140)=@ipv6_getmulticast={0x0, 0x3a, 0x100, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0xfffffffffffffcc5}, 0x1, 0x0, 0x0, 0x1}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 15:24:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xb, 0x20000000000000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'bond_slave_1\x00', {0x2, 0x4e22, @loopback}}) shutdown(r0, 0x0) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000001300)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000200), 0xc, &(0x7f0000001280)={&(0x7f0000000240)={0x1c, 0xe, 0x0, 0x0, 0x70bd25, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@typed={0x4, 0x6c}, @nested={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x14) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) [ 2862.585845] kauditd_printk_skb: 35 callbacks suppressed [ 2862.585855] audit: type=1400 audit(1536420266.859:26624): avc: denied { map } for pid=14996 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.640082] audit: type=1400 audit(1536420266.859:26625): avc: denied { map } for pid=14996 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.690084] audit: type=1400 audit(1536420266.889:26626): avc: denied { map } for pid=14996 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.740096] audit: type=1400 audit(1536420266.889:26627): avc: denied { map } for pid=14996 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.790076] audit: type=1400 audit(1536420266.889:26628): avc: denied { map } for pid=14996 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.841020] audit: type=1400 audit(1536420266.899:26629): avc: denied { map } for pid=14996 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.890077] audit: type=1400 audit(1536420266.899:26630): avc: denied { map } for pid=14996 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.940094] audit: type=1400 audit(1536420266.919:26631): avc: denied { map } for pid=14996 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.990085] audit: type=1400 audit(1536420266.919:26632): avc: denied { map } for pid=14996 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2863.015969] audit: type=1400 audit(1536420266.939:26633): avc: denied { map } for pid=14996 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:24:27 executing program 4: 15:24:28 executing program 3: 15:24:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20dfffff170080000000000b0800000000040008000000000000000000000000"], 0x20}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) [ 2863.774421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pig=14998 comm=syz-executor6 [ 2863.808672] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pig=14998 comm=syz-executor6 15:24:28 executing program 0: 15:24:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400000, 0x0) pread64(r0, &(0x7f00000001c0)=""/177, 0xb1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="240004001800010500000000000000002bdb0f080000a9475ed1b4cff0c8c8e60d6ba4d3dd23d874000400000000"], 0x20}}, 0x0) 15:24:28 executing program 7: [ 2870.200376] kauditd_printk_skb: 12 callbacks suppressed [ 2870.200385] audit: type=1400 audit(1536420274.459:26646): avc: denied { map } for pid=15007 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.280106] audit: type=1400 audit(1536420274.509:26647): avc: denied { map } for pid=15007 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.350099] audit: type=1400 audit(1536420274.509:26648): avc: denied { map } for pid=15007 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.400087] audit: type=1400 audit(1536420274.509:26649): avc: denied { map } for pid=15007 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.440107] audit: type=1400 audit(1536420274.529:26650): avc: denied { map } for pid=15007 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.520099] audit: type=1400 audit(1536420274.529:26651): avc: denied { map } for pid=15007 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.590090] audit: type=1400 audit(1536420274.529:26652): avc: denied { map } for pid=15007 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.640093] audit: type=1400 audit(1536420274.549:26653): avc: denied { map } for pid=15007 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.690086] audit: type=1400 audit(1536420274.549:26654): avc: denied { map } for pid=15007 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.740093] audit: type=1400 audit(1536420274.559:26655): avc: denied { map } for pid=15007 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:24:37 executing program 5: 15:24:37 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast1}, &(0x7f0000000840)=0xc) getsockname(r0, &(0x7f0000005500)=@hci={0x1f, 0x0}, &(0x7f0000005580)=0x80) accept4(r0, &(0x7f0000005640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000056c0)=0x80, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005780)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000005880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000058c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000005d80)={&(0x7f0000000000), 0xc, &(0x7f0000005d40)={&(0x7f0000000880)=ANY=[@ANYBLOB="04040000", @ANYRES16=0x0, @ANYBLOB="01002dbd7000fbdbdf250100000008000100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001006c625f68617b68737461747300000000000000000000000000000000000000080003904ecc926875000b00000008000400fcffffff080007000000000008000100006d9f2d2e4ce0d87978d40d591382f4722d807af3e0eeb5f34a6c9a068b646464b29a0c1f2a2baeb961ea9091f60710c8ec390664cb6fef9ef5840a3ae7740aa90d2ff6848abe4b520c51e9d10a9f0e66696555dc3c41e80e1457529810316dcb0e8fde", @ANYRES32=r2, @ANYBLOB="4400020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000008000100", @ANYRES32=r3, @ANYBLOB="b00102004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000004ff7211900000a60827050e410000010001007f06000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040005000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000010000008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100010008000100", @ANYRES32=r7, @ANYBLOB="8c0102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="5c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c0004003438041f0b06000008000309050000005600fffc55b5000009000706ac1a257705000000810000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400040000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="04000200"], 0x404}, 0x1, 0x0, 0x0, 0x4000000}, 0x850) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2873.153254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15017 comm=syz-executor6 [ 2873.593391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15014 comm=syz-executor6 15:24:38 executing program 6: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) r1 = socket$netlink(0x10, 0x3, 0x0) chroot(&(0x7f0000000000)='./file0\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x74, r2, 0x402, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x58}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xd1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd6e8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x64}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20c200000000000a8000000000000800001800040008"], 0x20}}, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x1ff, 0x10001, 0x7f9, 0x8, 0x0, 0xfb, 0x4000, 0xd, 0x7ff, 0x8, 0x3, 0x9, 0x100000000, 0x650d, 0x2, 0x9, 0xffffffffffffffff, 0xfffffffffffff15a, 0x3dc00, 0x1, 0x1000, 0x7, 0x20, 0x6c29, 0x7f, 0x0, 0x6, 0x80000000, 0x81, 0x3f, 0x8000, 0x9, 0x6, 0x4c4, 0x1, 0xc, 0x0, 0x8000, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}, 0x0, 0x401, 0x3, 0x0, 0xdee, 0x100}, r3, 0x2, r0, 0x8) [ 2874.213285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15037 comm=syz-executor6 [ 2874.394520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15037 comm=syz-executor6 15:24:38 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x1000, 0x21, &(0x7f0000000280)="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", &(0x7f00000000c0)=""/33, 0x3}, 0x28) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000001280)=ANY=[@ANYBLOB="200000001800010500000000000000000a800000000000080000000004000800c39c8a551dcd0e0cd88a930480624cc3bd032f3930c51dcd3ba9433ef7c35114e4f54d4b1efcf0944527d69665e070b89f40568834592726d7e51c43a09512c641fe2ae0e879ebb6d20a5e2dc52aa0fa189dfc2ef87e366c85e2109841f65277f7bdae27fecf567a667c1f704c49df041599eac0c06af3f4057b6e1370f67c3b9033f430d3b3e30b0d660d9c2b0f938990bded0bc2e08e4f58"], 0x20}}, 0x0) 15:24:39 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800018000000000f0070000000004000840"], 0x20}}, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x40000001}) 15:24:39 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x40893) 15:24:39 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffd) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800011500000000000000000a800010000000080000000097b20100"], 0x20}}, 0x0) socket(0x1, 0xfed4e761f3e73b14, 0x0) [ 2875.596099] kauditd_printk_skb: 164 callbacks suppressed [ 2875.596108] audit: type=1400 audit(1536420279.869:26820): avc: denied { map } for pid=15051 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.690100] audit: type=1400 audit(1536420279.909:26821): avc: denied { map } for pid=15051 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.763397] audit: type=1400 audit(1536420279.909:26822): avc: denied { map } for pid=15051 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.822804] audit: type=1400 audit(1536420279.919:26823): avc: denied { map } for pid=15051 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.900105] audit: type=1400 audit(1536420279.919:26824): avc: denied { map } for pid=15051 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.940108] audit: type=1400 audit(1536420279.939:26825): avc: denied { map } for pid=15051 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.990112] audit: type=1400 audit(1536420279.939:26826): avc: denied { map } for pid=15051 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2876.060101] audit: type=1400 audit(1536420279.959:26827): avc: denied { map } for pid=15051 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2876.120102] audit: type=1400 audit(1536420279.959:26828): avc: denied { map } for pid=15051 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2876.170112] audit: type=1400 audit(1536420279.959:26829): avc: denied { map } for pid=15051 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:24:59 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x2, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0c63362067c19a09cfaee60bac28636b7c228776274bac9d11b66560e2193926b29353c5e6b3e5128c02312caf58dc8c4183f007b3ff337e75abb0c0045890da6fcda570"], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="05630440000020000e630c4000000000"], 0x0, 0x0, &(0x7f00000001c0)}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10200, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x14, 0x0, &(0x7f0000000500)=[@acquire_done], 0x0, 0x0, &(0x7f0000000540)}) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) tgkill(r2, r3, 0x33) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000240)}) 15:24:59 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$packet_buf(r0, 0x107, 0x17, &(0x7f0000000100)=""/101, &(0x7f00000001c0)=0x65) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:24:59 executing program 2: 15:24:59 executing program 3: 15:24:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r2 = memfd_create(&(0x7f00000000c0)="df656d3021242100", 0x3) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0xf0, "2f116219ed54c76f396f82519d5b10e2d099bf4de4a6a7c9c017cdee976ebc21a00ef2ab04be287efff9ee87ca3fe9f230ae3fae003773d4f0cbfd328ce95ccdcfd81b0d62784d8602abc23bcaa6ff3fdcf6c73a917a4c440738e5b8d5c6eaf9ddbf609ad1426f7e7fad418ffdddb2be988f7775752ca235ad4b3adb1c17193e803e186f0239a902332bf18e91498f1058749fc6486118eed7905cfd1a34b8a2ef63246f4ff59beadd459b13e6f87242eb084e4ac1d0cd08657e5d48a1fbfd1978cfa55f68df54fdad571b541f1444474c245e0083309b38d090b4b2a4cecc824e0b3c230bc0c132687f85b089cb8939"}, &(0x7f0000000240)=0x114) keyctl$join(0x1, &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}) 15:24:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x4) [ 2895.318720] kauditd_printk_skb: 23 callbacks suppressed [ 2895.318729] audit: type=1400 audit(1536420299.589:26853): avc: denied { map } for pid=15067 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.420586] audit: type=1400 audit(1536420299.629:26854): avc: denied { map } for pid=15067 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.479667] audit: type=1400 audit(1536420299.629:26855): avc: denied { map } for pid=15067 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.540250] audit: type=1400 audit(1536420299.629:26856): avc: denied { map } for pid=15067 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.588950] audit: type=1400 audit(1536420299.639:26857): avc: denied { map } for pid=15067 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.611702] audit: type=1400 audit(1536420299.639:26858): avc: denied { map } for pid=15067 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.710327] audit: type=1400 audit(1536420299.649:26859): avc: denied { map } for pid=15067 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.760084] audit: type=1400 audit(1536420299.649:26860): avc: denied { map } for pid=15067 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.810102] audit: type=1400 audit(1536420299.659:26861): avc: denied { map } for pid=15067 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.860079] audit: type=1400 audit(1536420299.659:26862): avc: denied { map } for pid=15067 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b700000000000100bfa30000000000003e03030028feffff7ab8f0fff64ada6b69a4f0ff00000000b7060000000000017d400300000000005506005b00ed00001f040000000000002c64000000000000730a00fe00000000850000002e000000b7000000000040000000000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x2800, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='sessionid\x00') ioctl$RTC_UIE_ON(r1, 0x7003) eventfd(0x800) 15:25:01 executing program 6: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, &(0x7f0000000100)=0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:25:01 executing program 7: sched_yield() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x8, 0x3}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='\x00'}, 0x10) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000100)={0x1166, 0x1}) sendfile(r0, r1, &(0x7f0000000200), 0x488) 15:25:05 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x279) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f00000001c0)='threaded\x00', 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) splice(r1, &(0x7f0000000080), r2, &(0x7f00000000c0), 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000002a80)='/dev/loop#\x00', 0xffff, 0x20000) stat(&(0x7f0000001880)='./file0\x00', &(0x7f0000002bc0)) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(r3, 0x4, 0x5) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000fa4000)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) poll(&(0x7f0000000180)=[{r6, 0x8008}, {r5, 0x10}, {r3, 0x4}, {r3}, {r1, 0x1}, {r5, 0x100}], 0x6, 0x3ff) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockname$packet(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x14) getpeername$packet(r7, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_SIOCADDDLCI(r7, 0x8980, &(0x7f00000019c0)={'veth0_to_bridge\x00', 0xff}) recvmsg(r4, &(0x7f00000005c0)={&(0x7f00000003c0)=@hci, 0x14, &(0x7f0000000540)=[{&(0x7f00000018c0)=""/82, 0xfffffffffffffd00}, {&(0x7f00000004c0)=""/81, 0x31}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x3, &(0x7f0000000580)=""/48, 0x30, 0x40}, 0x40000000) setsockopt$inet6_MCAST_JOIN_GROUP(r7, 0x29, 0x2a, &(0x7f0000001b00)={0x0, {{0xa, 0x4e24, 0x2, @loopback, 0x9}}}, 0x88) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001940)={0x0, @broadcast, @local}, &(0x7f0000001980)=0xc) write$P9_RREADDIR(r4, &(0x7f0000000440)={0x4f, 0x29, 0x2, {0x8, [{{0x10, 0x1, 0x7}, 0x3ff, 0xfff, 0xd, './file0/file0'}, {{0x60, 0x1, 0x5}, 0x4, 0x7a0, 0x7, './file0'}]}}, 0x4f) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000001e80)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000800}, 0xc, &(0x7f0000001e40)={&(0x7f0000001a00)=ANY=[@ANYBLOB="9c00fdffa4c6a00437ed980822483f24b5d465e788529eece57d4308035fd59c68c6e545378b04c0564153559b540421488d65a931456c7849394fdd4a7f37ea5b402995f15cbefab9c2a5f27c7293387bf8d73c1597369f57b87c16551fa272baacc2", @ANYRES16=r8, @ANYBLOB="000027bd7000fedbdf250200000008000100", @ANYRES32=r9, @ANYBLOB="800002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000500000008000600", @ANYRES32=0x0], 0x9c}, 0x1, 0x0, 0x0, 0x8001}, 0x0) gettid() ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) 15:25:05 executing program 6: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet6_tcp_int(r1, 0x6, 0x15, &(0x7f0000000140), &(0x7f0000000280)=0x4) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000000)={@loopback, 0x0}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=@ipv4_getaddr={0x90, 0x16, 0x2, 0x70bd25, 0x25dfdbfb, {0x2, 0x1f, 0x14, 0x0, r3}, [@IFA_LABEL={0x14, 0x3, 'veth0_to_bridge\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0xfffffffffffffff7, 0x81, 0x0, 0x4}}, @IFA_LOCAL={0x8, 0x2, @remote}, @IFA_LABEL={0x14, 0x3, 'bpq0\x00'}, @IFA_ADDRESS={0x8, 0x1, @local}, @IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_LABEL={0x14, 0x3, 'rose0\x00'}, @IFA_BROADCAST={0x8, 0x4, @loopback}, @IFA_BROADCAST={0x8, 0x4, @loopback}]}, 0x90}}, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)) r4 = fcntl$getown(r0, 0x9) r5 = getpgid(r4) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000340)={'bcsf0\x00', @ifru_addrs=@xdp={0x2c, 0x1, r3}}) syz_open_procfs(r5, &(0x7f00000002c0)='net/snmp\x00') [ 2901.666890] kauditd_printk_skb: 34 callbacks suppressed [ 2901.666900] audit: type=1400 audit(1536420305.939:26897): avc: denied { map } for pid=15081 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2901.730097] audit: type=1400 audit(1536420305.939:26898): avc: denied { map } for pid=15081 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2901.783617] audit: type=1400 audit(1536420305.959:26899): avc: denied { map } for pid=15081 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2901.830100] audit: type=1400 audit(1536420305.959:26900): avc: denied { map } for pid=15081 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2901.880092] audit: type=1400 audit(1536420305.979:26901): avc: denied { map } for pid=15081 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2901.925374] audit: type=1400 audit(1536420305.979:26902): avc: denied { map } for pid=15081 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x20}}, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x200000, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000100)) [ 2901.980118] audit: type=1400 audit(1536420305.989:26903): avc: denied { map } for pid=15081 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2902.040095] audit: type=1400 audit(1536420305.999:26904): avc: denied { map } for pid=15081 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2902.090109] audit: type=1400 audit(1536420306.009:26905): avc: denied { map } for pid=15081 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2902.190099] audit: type=1400 audit(1536420306.089:26906): avc: denied { map } for pid=15083 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffc) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:25:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x16) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x800) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) prctl$getreaper(0x13, &(0x7f0000000000)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000200)="925ffd6914aef0d9db48b188ad47115d16b0e222d7182cc3d34b5fd9f63fb9646a51cc399dc12d5c7cfe4da7472837d48bb19312d9abe2d5abac3581dfb95ae46968e4cbbb8a1c596f5887930faf9577de220b181126a562e56560ced3291232f1edce5d0cf6"}, 0x10) setsockopt$inet_int(r1, 0x0, 0xe, &(0x7f0000000140), 0x4) 15:25:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x16) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a80000000000008000000149a000800"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 15:25:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xffffffdd, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a80000000000008f8ffffff03000800"], 0x20}}, 0x0) eventfd2(0xffffffff80000102, 0x80001) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000140)) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000001c0)=""/4096) socket$netlink(0x10, 0x3, 0x100000000007) 15:25:21 executing program 1: prctl$intptr(0x2f, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 15:25:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x80, r1, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xae86}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r2 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x2) ioctl$RTC_PIE_OFF(r2, 0x7006) 15:25:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r2, 0x818, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x48010) r3 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r3, &(0x7f0000000000), 0x5) listen(r3, 0x0) fcntl$addseals(r3, 0x409, 0x4) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r0, r3, 0x0) [ 2916.856900] kauditd_printk_skb: 128 callbacks suppressed [ 2916.856910] audit: type=1400 audit(1536420321.129:27035): avc: denied { create } for pid=15116 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2916.910768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15119 comm=syz-executor6 [ 2917.068997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15117 comm=syz-executor6 [ 2917.160931] audit: type=1400 audit(1536420321.129:27036): avc: denied { write } for pid=15116 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2917.185180] audit: type=1400 audit(1536420321.169:27037): avc: denied { map } for pid=15118 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.208050] audit: type=1400 audit(1536420321.189:27038): avc: denied { map } for pid=15118 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.260124] audit: type=1400 audit(1536420321.199:27039): avc: denied { map } for pid=15118 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.310934] audit: type=1400 audit(1536420321.199:27040): avc: denied { map } for pid=15118 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.336625] audit: type=1400 audit(1536420321.209:27041): avc: denied { map } for pid=15118 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.370078] audit: type=1400 audit(1536420321.219:27042): avc: denied { map } for pid=15118 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.421040] audit: type=1400 audit(1536420321.229:27043): avc: denied { map } for pid=15118 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.510150] audit: type=1400 audit(1536420321.239:27044): avc: denied { map } for pid=15118 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:27 executing program 3: 15:25:27 executing program 4: 15:25:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) r1 = dup2(r0, r0) r2 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0xc0010, 0xffffffffffffff9c, 0x0) vmsplice(r0, &(0x7f0000000540)=[{&(0x7f0000000100)="0accd140a78a29aae6a3c139e3c13334429318fb2f30a57e5d40b5f822622f83404ae0acc563996e363af630c7e8c5130f83723ec1555ad1919cf4c0421a29681b4d59cfb1402952628247a887", 0x4d}, {&(0x7f00000001c0)="635ceefd6d3b52d1afd84ab1abe3b7e6ca7d6fdd0afad6944513cd0fe1250c7ba4ec91cae54e4f54", 0x28}, {&(0x7f0000000200)="d97b2e680e1afb1aaadd0904736fd1618b9aef5808bb0a8f20e44bab784089206bd29cab0cfe58150e3a488673782fd1bfb57b7d1a8436ac206fe38df549afb20c637d57e39412125ced3d6d75eea2f5bb7651185d36dce594cf8844b8810ae2314eb8ddc5cd6e7f838c8823571b22a5531c", 0x72}, {&(0x7f0000000280)="bfd3f6160413270e9d3dc82afded6192edd59e41fd38eefae9c769101d6327e9b0cfd2d2d28dd2733d63b9aae66b330a6bdd7db644a275d17adea1d9f38a0559a954aae0754d9a8898428651a91b322b07b16554044accdd7b07a7e2646a807f1a79b0dbe85e4ab679b6bcb121e47b6a7d63a97df720557275bdc4199452087edf8444deb4dd87b08b44381de29a8d", 0x8f}, {&(0x7f0000000340)="6f6ef6eb86bcd8ebdfb536a8d73b44d1c18e829d1d959fa00c6491e95e98f592a5ba0c239b8658dd861249de1e76f32e1bfe88b8ddb71eb1f8ca085ed309d358db410b5a67952e8469b318f5990557f7c8e48cd5faabc4a090023ed35fec6a7706d65bde60e90d31526283eb5eae47ccf9319221de4711c9b17a6e51fee46c0c19c771086f08639daa67c8e95737aa21189e1bb0d5a85673a28e5778ff2faa1ef83dd992990b0ee5543cec482fde344159cf6d107897fe02b2f6d755e7a61021ab2909d8f0c6a88db35f43cdad", 0xcd}, {&(0x7f0000000440)="963c18b4da0ead6426fea27db88b4becba5866110931593bf0a0725519bdfe965ed9ad9d9eb2b22bb5e77bc3d649c9c0310a414e4bbdea81740005a7ae9c9e250b30c451bd1858cdac22d06011f3899ea073ceacf08017e74993cb3a11c1f5e49012f55ef44a5ea38e32f501c5e8f3620b25f95e4c22caebc0d9f015da78f56523c18f5bae3d6aa15de5e28003b40172a2a6ee9149697c252c2bf296db1af7fa98ea210756a1732e9d24fe2ef75d065ddb337a18955777e38966f5eb6c831a192d89abfffeb8b715a90de520cdec49bd7d05db8826c34a4b2f19df6fd5350b8fb2c8c51e4b1b15f016a2f4ca0efd4cb4c5e657", 0xf3}], 0x6, 0x8) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) [ 2923.979307] kauditd_printk_skb: 24 callbacks suppressed [ 2923.979317] audit: type=1400 audit(1536420328.249:27069): avc: denied { map } for pid=15129 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.030096] audit: type=1400 audit(1536420328.269:27070): avc: denied { map } for pid=15129 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.080082] audit: type=1400 audit(1536420328.269:27071): avc: denied { map } for pid=15129 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.130084] audit: type=1400 audit(1536420328.269:27072): avc: denied { map } for pid=15129 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.180085] audit: type=1400 audit(1536420328.289:27073): avc: denied { map } for pid=15129 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.240080] audit: type=1400 audit(1536420328.289:27074): avc: denied { map } for pid=15129 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.290079] audit: type=1400 audit(1536420328.289:27075): avc: denied { map } for pid=15129 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.340095] audit: type=1400 audit(1536420328.309:27076): avc: denied { map } for pid=15129 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.364591] audit: type=1400 audit(1536420328.309:27077): avc: denied { map } for pid=15129 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.390280] audit: type=1400 audit(1536420328.329:27078): avc: denied { map } for pid=15129 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:30 executing program 0: 15:25:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x1cc8368bb4c4f6e9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) close(r0) prctl$setfpexc(0xc, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)=@nfc={0x27, 0x0, 0x2, 0x7}, 0xffffffffffffff3d, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x8000}, 0x4000044) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat(r1, &(0x7f00000006c0)='./file0\x00', 0x202400, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000700)=[0x6, 0x8]) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000500)) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000400)={0x2, 0x3, 0xfd, 0x7, 0x1, 0x4, 0x5, 0x1000, 0x0, 0x2642}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48400001}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="00032abd7000fcdbdf250c0000000c000300080004000000000024000100080008000600000008000200ff00000008000b00736970000800050000000000080004000600000008000400ff030000"], 0x1}}, 0x40000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x20000098) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x0, 0x0, &(0x7f0000000340)}, 0x20) 15:25:30 executing program 5: 15:25:30 executing program 6: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x80) sendto(r0, &(0x7f00000001c0)="d517744461ca67685a1dbe8de53884479512e5d60ca65f849b7c4da37c226e19915404a871801c7f9d74a0a658dcd6e30070d31e1b38d3b64e037a107a902e381fffb0108d50df2b6c3a7988d219626937d4986b7846a58f249e6187334ad06a0723bc2384fe80a46d3841c002800fd7660209a3737d2f8d4565d319ac161887294a56948ebabc4886c30025430c27e90a8989bd14502ed1ad9cb4a40ebc8daf7efa41e6031da4eb8b215b63eb57cfb3086fae91c4c9f53fdcf65a39e313942c3d21c9c2", 0xc4, 0x4008010, &(0x7f00000002c0)=@ethernet={0x1, @dev={[], 0xe}}, 0x80) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a8000000000000800000000041d0800"], 0x20}}, 0x0) [ 2925.884636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 2925.918531] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 15:25:30 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:25:30 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x100, 0x1b, 0x4, 0x70bd27, 0x25dfdbfe, {0x7}, [@nested={0xec, 0x3b, [@typed={0x8, 0x75, @uid=r1}, @generic="1a8fa9e44092c4559edc9c45fe528d45db2b172692df9adc4bbca427740bc09104a42683780f24d1fc8395bd0a37e75a484a659e42830e4e3ef959db030e4a221acdb35195976a692e7054d56c26f49fad46e62736cfd1338c3fd0531d54f8261123b53dafa9030207eb520d2c36e8c805984e974655c237799a9fc9499fa79e41eba5ffb7ea949251ffcd9b06ab430633269686b7909c243fb00f8f064004c85a533a45fd8715fdc77c87e98c51c786b07fb3a579606f9c8e505de6d114b08d58e46ae11d7aa8b765", @typed={0x14, 0x89, @ipv6=@mcast1}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000180008000000000000000000baad000000ac3fd4000004000800fadadb66d5a7f029651cbc4c65d1e9de78b599"], 0x20}}, 0x0) [ 2926.550496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pig=15142 comm=syz-executor6 [ 2926.613807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pig=15143 comm=syz-executor6 15:25:30 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="200001010000010500000000000000000a80000100686d000008000000200400080049d5d10fe09da86cbd1cd62b875078196400ac197a49242f9465ff4eb9e996abfb9cc30d4a39994d1b90339a07f0eeea0b44a2ad4576c8d08f6f6c713ca00f0964b73f5097bf0b7896dda5cd35dac51a018d3de3a3122996c03dc68c74386b45b1a90c5570d59fd57ec598d344180747c147bfc4e7c1d6dc1b97148203162ee2e2d92496e5e02f3634f58b33b3360181b38715b1ff56caaa00c1995722a1e12ebdff487851ed"], 0x20}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x800, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)}, 0x10) getsockname$netlink(r1, &(0x7f0000000500), &(0x7f0000000480)=0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200000, 0x40) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000000c0)) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000100)=0x909) [ 2926.982962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15146 comm=syz-executor6 [ 2927.030366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15146 comm=syz-executor6 15:25:31 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x580, 0x0) 15:25:31 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) getsockopt$netlink(r0, 0x10e, 0xe, &(0x7f00000001c0)=""/210, &(0x7f0000000000)=0xd2) 15:25:31 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="39000000cb9c31daef6109aa18000105000000000000000000feffff0000001db700000004000800"], 0x1}}, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) 15:25:42 executing program 2: 15:25:42 executing program 1: 15:25:42 executing program 7: 15:25:46 executing program 3: 15:25:46 executing program 4: 15:25:46 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x80000000) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2d, 'memory'}, {0x2f, 'memory'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'io'}, {0x2d, 'memory'}]}, 0x3f) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2942.329439] kauditd_printk_skb: 79 callbacks suppressed [ 2942.329448] audit: type=1400 audit(1536420346.599:27158): avc: denied { map } for pid=15171 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.410136] audit: type=1400 audit(1536420346.649:27159): avc: denied { map } for pid=15171 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.510136] audit: type=1400 audit(1536420346.659:27160): avc: denied { map } for pid=15171 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.590090] audit: type=1400 audit(1536420346.659:27161): avc: denied { map } for pid=15171 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.660080] audit: type=1400 audit(1536420346.659:27162): avc: denied { map } for pid=15171 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.730088] audit: type=1400 audit(1536420346.719:27163): avc: denied { map } for pid=15171 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.790114] audit: type=1400 audit(1536420346.719:27164): avc: denied { map } for pid=15171 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.870091] audit: type=1400 audit(1536420346.749:27165): avc: denied { map } for pid=15171 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.930119] audit: type=1400 audit(1536420346.749:27166): avc: denied { map } for pid=15171 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2942.980079] audit: type=1400 audit(1536420346.769:27167): avc: denied { map } for pid=15171 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.468388] kauditd_printk_skb: 23 callbacks suppressed [ 2947.468397] audit: type=1400 audit(1536420351.739:27191): avc: denied { map } for pid=15174 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.550089] audit: type=1400 audit(1536420351.759:27192): avc: denied { map } for pid=15174 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.620121] audit: type=1400 audit(1536420351.759:27193): avc: denied { map } for pid=15174 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.690085] audit: type=1400 audit(1536420351.789:27194): avc: denied { map } for pid=15174 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.770089] audit: type=1400 audit(1536420351.789:27195): avc: denied { map } for pid=15174 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.840089] audit: type=1400 audit(1536420351.819:27196): avc: denied { map } for pid=15174 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.890081] audit: type=1400 audit(1536420351.819:27197): avc: denied { map } for pid=15174 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.940082] audit: type=1400 audit(1536420351.819:27198): avc: denied { map } for pid=15174 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2947.990088] audit: type=1400 audit(1536420351.859:27199): avc: denied { map } for pid=15174 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2948.040079] audit: type=1400 audit(1536420351.869:27200): avc: denied { map } for pid=15174 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:57 executing program 5: 15:25:57 executing program 0: 15:25:57 executing program 2: 15:25:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x16) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x20}}, 0x0) [ 2953.118926] kauditd_printk_skb: 1 callbacks suppressed [ 2953.118936] audit: type=1400 audit(1536420357.389:27202): avc: denied { map } for pid=15178 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.172173] audit: type=1400 audit(1536420357.399:27203): avc: denied { map } for pid=15178 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.219358] audit: type=1400 audit(1536420357.409:27204): avc: denied { map } for pid=15178 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.280099] audit: type=1400 audit(1536420357.409:27205): avc: denied { map } for pid=15178 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="18008efee4b1adb335abb5650ce5200000001800"], 0x20}}, 0x0) [ 2953.332431] audit: type=1400 audit(1536420357.429:27206): avc: denied { map } for pid=15178 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.390093] audit: type=1400 audit(1536420357.439:27207): avc: denied { map } for pid=15178 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.480103] audit: type=1400 audit(1536420357.439:27208): avc: denied { map } for pid=15178 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2953.546279] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=45540 sclass=netlink_route_socket pig=15183 comm=syz-executor6 [ 2953.570165] audit: type=1400 audit(1536420357.449:27209): avc: denied { map } for pid=15178 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.620093] audit: type=1400 audit(1536420357.449:27210): avc: denied { map } for pid=15178 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.690096] audit: type=1400 audit(1536420357.549:27211): avc: denied { map } for pid=15180 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:25:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x2, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001640)={&(0x7f0000001440), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0xa4, 0x35, 0xd05, 0x70bd2d, 0x25dfdbfc, {0x1d}, [@typed={0x8, 0x5d, @uid=r1}, @generic="0e24a4f7ba32aac5947fe33f81da8ac97c60f562f64adf31753e56abfba5cf0936c6909db303541059d39173e1ba51f29ec73792e360cd98c3a3aac6d3d66ce21420e6afc7e7c7a31b2b092108afcd10865b074a9002c9c4539b35f1617267044e131ebd0b3201e5703fa8cfd007a2d18c2a43c13f4f55e09687b719fa97729a0e32066c952b83"]}, 0xa4}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) writev(r0, &(0x7f00000013c0)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f0000000100)="b74d55eed2ffb09fbb6b6ff7bec67957c5cea0631d5b1db8642d7d996d974affd9ff314f44bb3615f2a81547005ae065858d14a7802411492cc51ac8ade12bd5f261", 0x42}, {&(0x7f0000000000)="58e99afadccbe4b5a4876c00ae283975e28332", 0x13}, {&(0x7f00000011c0)="4a35ae6f4d103ba53e8bc243299c04d5a207944bd0341fc6989203a9cbb5d44ac9b646d61d087aa41de42126cd416a439535a122cc6d4769", 0x38}, {&(0x7f0000001200)="3f7dfbd1ce5b2dd1bbb25ac8e140363c74869533435ae34f1be80de6b34d2b4f1e96b8990f21289c5eb05862a85a4608f0ca1fb310f1b7468d37a580c35516323a31e68f22130ec7e50b16d582266f65edc7c08211392efe6e715db240aa3ee9e6f2e3c9ee1dcc48441efc6d429ec461b56bf1109573bd634565c91750eac24cc3bb563bbbe206d5c7c40f05f9952d431cab80ddf8bce1673468893235fb0d400a3c27e7ac33288642aead01b13534596af5b882dcd57cd78a19dadde31785fec49dfa9cc3670db75fd55657144ea8dc1ab5c1e76df27f7c87f630a70624fb5f4cae", 0xe2}, {&(0x7f0000001300)="7528d04003890b8330ff10a7cb58190c70c7c8d5d50e564d74ae29a8cdfbef21c75ba81f37878d72e520e9b33ae8be791fa0384acba4527607812afe311bbf6ad3b97ddffef6729ffe3ca48ad38407515bfb6e21c81c226a33bac9454cd66561d17842c4bf037ff5a1a2f20d55d19bcb1d08207254ad087d03e02e99d93de305fc422f365a02378fe1311f3f4e5eb83cf0dac7c8077b877ee541640c0c060bd0ba58ba9cd2", 0xa5}], 0x6) [ 2954.162143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pig=15190 comm=syz-executor6 [ 2954.198527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32718 sclass=netlink_route_socket pig=15191 comm=syz-executor6 [ 2954.426354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pig=15191 comm=syz-executor6 15:25:58 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x5) socket$netlink(0x10, 0x3, 0x8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) 15:25:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000018084f664240a64f6a2aa99700010500000000000000000a80000000"], 0x20}}, 0x0) signalfd(r0, &(0x7f0000000000)={0x8001}, 0x8) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) dup2(r0, r0) [ 2955.332634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2072 sclass=netlink_route_socket pig=15203 comm=syz-executor6 [ 2955.375606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2072 sclass=netlink_route_socket pig=15203 comm=syz-executor6 15:25:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x442000, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000100)=0x5) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0xffffffffffffff0c}}, 0x0) 15:25:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) init_module(&(0x7f0000000000)='^,wlan0\x00', 0x8, &(0x7f0000000100)='\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000200)=0xffffffffffffffad) getgroups(0x2, &(0x7f0000000240)=[0xffffffffffffffff, 0xee01]) chown(&(0x7f0000000140)='./file0\x00', r1, r2) 15:26:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020d000010200000000000000000000003000f08ca80000002001068e000000000000000000000000800120001000200000000000000000034000000020300000000000f000000000a0000000000000092ab000000000001"], 0x58}}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'veth0\x00'}) 15:26:13 executing program 7: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) fchmod(r0, 0x0) 15:26:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="20941fa10600010500000000000000000a800000000000080031eac96400080044d5579b8e347e049121e874cac5a5f5c1486b6a3960331e44fd72a0fe36ea9a3352a8f993b49f45326c3e83d685c430e0260db1a239eb67f5704792cc33f202bd4d9a8961ee55650211d1ccf4568ad8bda9c57c24798abffd7d6cf46e101f52642804aaa21cd42cf71f8da31ddcd73d151ae354d5375f24848c65732a8c01c166db62ef8612d29d61b1ac1f71a770d1c09efd113e28d5f05c689cef5c63322da83457613c1c93529f51a7b5fc1af8574ebed654ca944a803793796e9875d2a4421b9c7c413c3a6f92896e3fdf2e63f103873ca0585949b04e3854b2b846876019"], 0x20}}, 0xfffffffffffffffd) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x8e) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) syz_open_pts(r1, 0x0) 15:26:13 executing program 3: 15:26:13 executing program 4: 15:26:14 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) [ 2969.889210] kauditd_printk_skb: 130 callbacks suppressed [ 2969.889218] audit: type=1400 audit(1536420374.159:27342): avc: denied { map } for pid=15224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2969.950088] audit: type=1400 audit(1536420374.199:27343): avc: denied { map } for pid=15224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.000083] audit: type=1400 audit(1536420374.199:27344): avc: denied { map } for pid=15224 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.070180] audit: type=1400 audit(1536420374.199:27345): avc: denied { map } for pid=15224 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.120095] audit: type=1400 audit(1536420374.199:27346): avc: denied { map } for pid=15224 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.170083] audit: type=1400 audit(1536420374.229:27347): avc: denied { map } for pid=15224 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.230077] audit: type=1400 audit(1536420374.229:27348): avc: denied { map } for pid=15224 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.280109] audit: type=1400 audit(1536420374.249:27349): avc: denied { map } for pid=15224 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.330106] audit: type=1400 audit(1536420374.249:27350): avc: denied { map } for pid=15224 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.390111] audit: type=1400 audit(1536420374.269:27351): avc: denied { map } for pid=15224 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:21 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000140)=""/250) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000004c0)=""/125) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) 15:26:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800000500000000000000000a8000000000001b0000000004000800"], 0x20}}, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280)) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) 15:26:21 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000280)=@abs={0x1}, 0x6e) 15:26:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{0x20, '/dev/keychord\x00'}], 0xa, "7a126882936a96c81329846d29305311e45c7b7b614d363a4a5d5a37b32320882cef648e6f139a43ded4fea3af3a592f9d860b30bf69907928c1fed39b90f2cc0175714752b3ba1afaef1ba36fa56dbe1817f6945e82ad482779fce1382c747bcd736eac494b5c36da48ba010121aed1ae8599016f95e6e4fad7cc5095bdfbe1c5872a3e19f0c02ab444f623fbb30d759d8e567be2ad7096a2303df676031b289629d92d63038d5d1bb9cc565f"}, 0xc7) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x20000, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000001c0)=""/144) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2977.508971] kauditd_printk_skb: 12 callbacks suppressed [ 2977.508981] audit: type=1400 audit(1536420381.779:27364): avc: denied { map } for pid=15230 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2977.582286] audit: type=1400 audit(1536420381.839:27365): avc: denied { map } for pid=15230 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x41, &(0x7f0000000100)="00e2f9ece16fb924b30c8826680130", 0xf2) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2977.614041] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=15232 comm=syz-executor6 [ 2977.641173] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=15232 comm=syz-executor6 [ 2977.710088] audit: type=1400 audit(1536420381.839:27366): avc: denied { map } for pid=15230 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2977.750125] audit: type=1400 audit(1536420381.839:27367): avc: denied { map } for pid=15230 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2977.800091] audit: type=1400 audit(1536420381.859:27368): avc: denied { map } for pid=15230 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2977.880174] audit: type=1400 audit(1536420381.889:27369): avc: denied { map } for pid=15230 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:22 executing program 6: socket$netlink(0x10, 0x3, 0xf) [ 2977.951317] audit: type=1400 audit(1536420381.899:27370): avc: denied { map } for pid=15230 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2978.040162] audit: type=1400 audit(1536420381.909:27371): avc: denied { map } for pid=15230 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2978.130161] audit: type=1400 audit(1536420381.919:27372): avc: denied { map } for pid=15230 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:22 executing program 6: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r1 = getpgrp(0x0) tgkill(r0, r1, 0x15) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 2978.200097] audit: type=1400 audit(1536420381.939:27373): avc: denied { map } for pid=15230 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:22 executing program 6: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8001800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipmr_newroute={0x9c, 0x18, 0x0, 0x70bd29, 0x25dfdbfd, {0x80, 0x94, 0x14, 0x401, 0xff, 0x7, 0x0, 0x2, 0x1000}, [@RTA_MARK={0x8, 0x10, 0x727}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_METRICS={0x68, 0x8, "8f17c58d02abdbf1f8fa12bc75e9389caf9564f0a8c1a44ce74aad8e078e55cb986b4ea6fb23b6b5e393da094d235de1ed2b7b5cef2909ef2da72298a98a8ef97ffbcdcbcdb07317606da6d29c0230c0fbe8f3db98d68eefdef07e232e29bcc78efad94b"}, @RTA_PREFSRC={0x8, 0x7, @remote}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x4001) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:26:23 executing program 6: socketpair(0x5, 0x5, 0xd28c, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:26:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d2e1ff0018000105000000000000000093800000000000080000000004000800"], 0x20}}, 0x0) 15:26:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000440)={[], 0x0, 0x72, 0xfffffffffffffff9, 0x0, 0x0, r2}) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sched_setscheduler(r2, 0x5, &(0x7f0000000080)) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000380)=""/161) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 15:26:41 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f0000000000), 0x0) 15:26:41 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000a80000000f70000000000040008000000000000000000000000000000"], 0x20}}, 0x0) [ 2997.495669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=128 sclass=netlink_route_socket pig=15268 comm=syz-executor6 [ 2997.695301] kauditd_printk_skb: 74 callbacks suppressed [ 2997.695311] audit: type=1400 audit(1536420401.969:27448): avc: denied { map } for pid=15269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.750123] audit: type=1400 audit(1536420401.969:27449): avc: denied { map } for pid=15269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.800091] audit: type=1400 audit(1536420401.979:27450): avc: denied { map } for pid=15269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.840101] audit: type=1400 audit(1536420401.979:27451): avc: denied { map } for pid=15269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.890102] audit: type=1400 audit(1536420401.979:27452): avc: denied { map } for pid=15269 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.940111] audit: type=1400 audit(1536420402.009:27453): avc: denied { map } for pid=15269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.990100] audit: type=1400 audit(1536420402.009:27454): avc: denied { map } for pid=15269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.040130] audit: type=1400 audit(1536420402.029:27455): avc: denied { map } for pid=15269 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.090144] audit: type=1400 audit(1536420402.029:27456): avc: denied { map } for pid=15269 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.140154] audit: type=1400 audit(1536420402.059:27457): avc: denied { map } for pid=15269 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:42 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x20000000000000) 15:26:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) exit(0x1ab9) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f000000f000)=@abs, 0x6e) bind$unix(r1, &(0x7f0000000280)=@abs={0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 15:26:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000000)) [ 3002.761466] kauditd_printk_skb: 12 callbacks suppressed [ 3002.761475] audit: type=1400 audit(1536420407.039:27470): avc: denied { map } for pid=15272 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3002.860158] audit: type=1400 audit(1536420407.079:27471): avc: denied { map } for pid=15272 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3002.930158] audit: type=1400 audit(1536420407.079:27472): avc: denied { map } for pid=15272 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.000099] audit: type=1400 audit(1536420407.079:27473): avc: denied { map } for pid=15272 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.080095] audit: type=1400 audit(1536420407.099:27474): avc: denied { map } for pid=15272 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.150092] audit: type=1400 audit(1536420407.129:27475): avc: denied { map } for pid=15272 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.200134] audit: type=1400 audit(1536420407.129:27476): avc: denied { map } for pid=15272 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.250101] audit: type=1400 audit(1536420407.129:27477): avc: denied { map } for pid=15272 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.300088] audit: type=1400 audit(1536420407.129:27478): avc: denied { map } for pid=15272 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.350099] audit: type=1400 audit(1536420407.169:27479): avc: denied { map } for pid=15272 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:53 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$inet_buf(r0, 0x0, 0x38, &(0x7f0000000240), 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0xffffffffffffff84) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) 15:26:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a800400000000080000000004000800"], 0x20}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101001, 0x0) 15:26:53 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000080)) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000004c0)=""/125) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000100)={0x0, 0x1, 0x6, @broadcast}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000bc0)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[]], 0x1) 15:26:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xffffffffffffffff) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[]}}, 0xfffffffffffffffe) [ 3009.567884] kauditd_printk_skb: 12 callbacks suppressed [ 3009.567893] audit: type=1400 audit(1536420413.839:27492): avc: denied { map } for pid=15282 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3009.660090] audit: type=1400 audit(1536420413.879:27493): avc: denied { map } for pid=15283 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3009.820149] audit: type=1400 audit(1536420413.879:27494): avc: denied { map } for pid=15283 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3009.930093] audit: type=1400 audit(1536420413.889:27495): avc: denied { map } for pid=15282 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000200), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYRES64=r0, @ANYRES16=r0], 0x2}, 0x1, 0x0, 0x0, 0xc850}, 0x0) socketpair$inet(0x2, 0x80000, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000080)={0x57ef, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}}, 0x88) [ 3010.040123] audit: type=1400 audit(1536420413.889:27496): avc: denied { map } for pid=15282 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3010.081814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3010.081821] audit: audit_lost=349 audit_rate_limit=0 audit_backlog_limit=64 [ 3010.081826] audit: backlog limit exceeded [ 3010.091339] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3010.091347] audit: audit_lost=350 audit_rate_limit=0 audit_backlog_limit=64 15:26:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 15:26:55 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x8000) remap_file_pages(&(0x7f0000ff9000/0x5000)=nil, 0x5000, 0x2000000, 0x20, 0x2000) 15:26:55 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @local}}, &(0x7f0000000000)=0x80) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000d1800010500010000000000000a6300000000000800000000040007f8"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000040) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x80) epoll_pwait(r1, &(0x7f0000000200)=[{}, {}], 0x2, 0x4, &(0x7f0000000240), 0x8) 15:26:55 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:26:56 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a000000000000080000000004000800"], 0x20}}, 0x0) [ 3014.600877] kauditd_printk_skb: 204 callbacks suppressed [ 3014.600886] audit: type=1400 audit(1536420418.879:27643): avc: denied { map } for pid=15320 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.680093] audit: type=1400 audit(1536420418.879:27645): avc: denied { map } for pid=15320 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.750272] audit: type=1400 audit(1536420418.879:27646): avc: denied { map } for pid=15320 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.820095] audit: type=1400 audit(1536420418.879:27647): avc: denied { map } for pid=15320 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.890905] audit: type=1400 audit(1536420418.879:27648): avc: denied { map } for pid=15320 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.940136] audit: type=1400 audit(1536420418.879:27644): avc: denied { map } for pid=15319 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.990089] audit: type=1400 audit(1536420418.909:27649): avc: denied { map } for pid=15319 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:26:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000080)) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), 0x4) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000004c0)=""/125) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000100)={0x0, 0x1, 0x6, @broadcast}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x498, 0x270, 0x270, 0x140, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f00000000c0), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffff00, @mac=@local, {}, @mac=@local, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0xcaf0, 0x0, 0x0, 0xfa, 0xe5, 'dummy0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x4}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @dev, @local}}}, {{@uncond, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "6a2f511d60858ad752cc8609823cd63eb72611aa5d1140f076c688c1774b"}}, {{@arp={@multicast1, @broadcast, 0x0, 0x0, @empty, {}, @mac=@random="e2fcdc9306b3", {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, 0x40, 0x5, 0x100, 0x0, 0x0, 0x0, 'vcan0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0xe}, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @rand_addr, 0xf, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e8) [ 3015.030143] audit: type=1400 audit(1536420418.909:27650): avc: denied { map } for pid=15319 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3015.062762] audit: type=1400 audit(1536420418.909:27651): avc: denied { map } for pid=15319 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3015.087305] audit: type=1400 audit(1536420418.919:27652): avc: denied { map } for pid=15320 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.418700] kauditd_printk_skb: 30 callbacks suppressed [ 3020.418710] audit: type=1400 audit(1536420424.689:27683): avc: denied { map } for pid=15325 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.503467] audit: type=1400 audit(1536420424.719:27684): avc: denied { map } for pid=15325 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.570092] audit: type=1400 audit(1536420424.719:27685): avc: denied { map } for pid=15325 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.660086] audit: type=1400 audit(1536420424.719:27686): avc: denied { map } for pid=15325 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.730086] audit: type=1400 audit(1536420424.739:27687): avc: denied { map } for pid=15326 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.810100] audit: type=1400 audit(1536420424.739:27688): avc: denied { map } for pid=15326 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.880139] audit: type=1400 audit(1536420424.739:27689): avc: denied { map } for pid=15327 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3020.922906] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3020.922913] audit: audit_lost=370 audit_rate_limit=0 audit_backlog_limit=64 [ 3020.922917] audit: backlog limit exceeded 15:27:07 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup3(r0, r1, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) 15:27:07 executing program 6: r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'selinux'}, {0x20, '\''}], 0xa, "47e5e90737c1389042424f78695eff8d7d8b6593af1087ad106a475db80c8e5a4a988933dfba27777afc859e8dc249eee1d806ceb25428dfdeea6be4588862fc33cd33857d7e8c723af49e96ae0a8f2ae05de99b4111e02b8902156ffb8b9e561a4de43028a24356bb0dbf7affccb5417dd2d5dd865b5a88610c83eb846681a977535a50e30df7aa0110e926dce4bc44b193cef0a73eaf920afbb1806e94a1449fb544330c3f112f08a1c429ba68a1dede00703537ab400580020e21e4137b4d6d587b00e33a06ddff5119dc3e1cf130fbc96c41a14cac23cb3c6b4345164b5ac25284164593fb397d354b62fadabbbfc579ad3b4cfcfb53f3e26529ffab8e889c58059b42cc96783b26016d84dd17335c3abaca83e140edab2cefb223b385f0234497a348d634d96fd95250dc982e80e64f66cea9b6537ed5096085dbd8d34b9566683bb986d32b6755b5873107781d2e768c860ad5d00e3f76cdf958b24937b9c117d250fe81fd5cafff9bce10b6906eef28291baa4a921b1acf565d6f6bf837f5e1b7a3816bfca5d14e4c1089f74ec50d25bec0fc6eab43b1ed800401efed13aecc1aa153076e9f20ad2de9cff135aa5be2bb4b7dec5d7f1f4753f4146ad77181a0b56124cdcc215cd9754fd1548f48ee7e68b2468b9a1f71f0f5683279e5caf03037f49a2faa9e0514dc9c763d7b422576a91f349c17717c1fd233d52ddf77d36e11e12e9a39b75bc3702d002f2406939a925ac3a4f74392001535b24fc87be607da2e0f077ff0e1643baf843e30ad20c42b7178fca337ab8368e0634c8094496b37a3f9aefaab9709b93ee165dd9f0afded61455a9e3b3bd5ddb6acd4c002177ec348426513508eee3758573fc7c31e54c6e2d7ab9268a30db8a85d6a0028f82208e44321c58fa1b95c18a65e4dd13dc3930ccb604ae711b6a6d473862a1cf992a33c4c6ea9a0e1479b8b942bd04bfd4a0d2c817e9171b48fa9b987250b828e8c0b5d8fd4a86a3f99461fa955e7aa475f2711bbad2ed8a4485ddbd07bcce3a23e6276aaf08cab0998cdd925762b7999e0d775a42c39a64f8582713ebadd30875882e83063a5b935a5d93ad5b40cdfe709a5bc22331b3bc67da884a84e9c7c82937dcc61a0a3495c6e3f3227e34b91e727a926db32d2bb5b25a951fadf0183313609bf6cb17ad9820e7e439c2212f94184b8339f4da2dc10c00965cc6a0135a5a63fbaf8bd96c53ca95abacddf30fbbce201a5882f1040404112ebdd47630c5ac29d9c16b11b6cbbf3e951d6dd51508fc7ccbf37c1f7cef0269434ebf1f3b33a797d19dff6c8a09c98e8ae4d90b4a0a87f9c780d5bae206edb9f4dd4cbe49162cf9a0bad7fdb4070505db96f1894faabb8a7b5a822f0c23995f6b58aa28cdc8cfe03a87db8520026f159e7d31f40d90860ff5ee556333d98899ccec9128ad945b4812b7c12cc59537d6e51627365381343a400d58de3c4008899eea4ad268e809d6aca89ee5477143bcc79d937968bfaeb46c458fcc0143a52d771ab0dae3bc21e1b435586d1d8cf38c21f8f752126f9da553d5c8423f6f8554153717b9ae5685365e6ced804fea081ed0a94f07094cf3700025eef0028c552df0d0a955b1603961111ac0820f2a57bf1962a0ef583d186341599bae8c7f024d44c9d56729abcc66bc66d316d8ed8aa64769ac891fdb027dbc2747e3204757a4e94820e92cc1e6cc7dfdd21ac3c0fa533f78d9c8f03e628b272b640e77e4d28f8ba2470418d1db49cead76db2917b96ad9d14d873caa01f0ace09c79f64b6cdc6cc6dfd3b396bac9d4ccd8ff61585341430f9995d872452e003aa0e8381e8fd37f5776df6f4c41ea033d47df8225d46a843438c576deea7ae2677b8c7f9c072169df4a51a39ca5c61f0b4e5a7c9ad072cfce7d786471b9993bf708e2c205d52a900da6ca6a97e7bc385a1013d589cd29016087e5b81ee0d0f871ae914cb7b48059558316df3284d0462a301385c97048406f05527423eacbcec447fc37b174ecdec752b9126b9da46a0c714936bd56e67706fb04fb41e74fa0a13100e7d4ee10f31e09cfe36a4efe2d3800a436fadd0351c74b2094eae2011500eee62ec7e2190113ff0a8e9c583c5c924d2aca3723779ce9876c1d054ea73d4accf3ca2b710cb998e078bad441d39eac5d2673cfd9e7b145c229ee4b80824aba77baf64f12581e9fcde2bbf57be5e8e82854ef3d146b6a70e0b68a2ac6cd44955c43f32b854fc33e5d068e46cf1502cdecab8eeea1959eabc347e239ac9bb4746e8223f534ad5f50e71b1ccfc9dc510d23ce8809ecca30b733fa5b9ec227b981385c63de136c034c32f0ddc1e59d899766f61290647c1dfcdeebc67de6e125c5e631672af6e7630139e91e96159f01272155793b3d96e5c6297518a010e18a225ea0b8bc117c2d9ec0996b807845bc8e3180eaeff3ceba3225131ce6ea4f240c2813308c18cdd3fb2cfc90ce5bf32be582ee007686fb7ba1f34737970f9995f830c999cc7478317240b107e97bfb0e106195d154c1c86656220053cd51fe0ad68f8d6ddb64b32fe22eeeebd507fe702cd54b8be0a251c0e858be111e80a3015ce6a049c1cc901db184f9986564957acb70755bbc866f1100b599b080377c059f37e2e6fbbb0e5c7e7f76deacf371588d73dfea874687bcf8f6cf9d51fdca06f1e55bdd07dd5c21b7969336ad88d5650150ba72484897904c11b9cfb83cd7f4f513d68219c1de4b585e82786c4405fc641052dc47adb6b5e079ae6ac83f41960a19f36b5e55cd948c90840d006c494baa46342a75e512eca57488a85c5170c75b1f8e389f605d144d58f445a1c72079542fbdeca0d4693cd95d91207b9a2ab763d1baaf855355b2de6b05b2c54b69a607316786e0b2eb8f2c874c02ff292cac4f11497acf75b4e67026056a92bb7f261b8ab6784adeb68a7b02c3d9cde62d0f6f12f4036e09a365cff2e75a695aed354e77a0d76d396989951d920ed70ca1e037bf3aa0dcb93ff80189606df263c61852c5bba2b0d37c441e986db26f2f4e3bc0386a1efcdf55178adba2c51947e6a23f56d498f17347cd026e20ce0d6add6ac14553e607980bc5fd429ff09ecd4f95e190a2b523af507a0ea040bc1508087a6af6445800e50d07ad0b967e2494805ec9d8920d48189684d886fc22cf3815ca83f6aa123dd1e86f2f96424a9de9db183e51221e9d0b8e49f3292f722c92ecf65f9586e8d388477a66c26c37361aab41e8c94af5ed2c492bdc5373b5d3b6d58bf4a7ea23986cd08a5fb5e2cc8b44d5aaddcffc296e8e3ff70b8332fc44e1ef7b5e2ebb428118a2b1a777939235c10202825d236a9a69855569172a8e59f2e0d57618017d4be57adbda56157b7ad21ac241dd909f62a52f961a11ed3dcfe07eaca7d023871774035e730d7432ca6daf7b011bb45ab14ea04d7048ecb155bc593388ef9096659180f941fc068622a2d598db36a1006c66b91c8b86f320380ad2eeddd4879e7031fbcee9858eedbf965085ee3ad0db9e98a1f60e6c98e86bfeab823415b5a9ea943a4e1b7bbda9aba49d172b4e78f25ad5723470e9660a8775eed03c04d34bd06b46e69875a19bc6228f5116b271de868a4e27e4052d247687a0b56bdc24994bbab0d5cc605084122d027fd238d26008ab4985fed86e3f2e0c0c30ca5c089b99cba27d500fc8e4b3756b43ab1c0b6c16fa458c0f48981f3c508875d44cfca8cde01c53c07ed9ffc9b3a8e816edaef2203764a763265914a4a77e59d38b586005278b9fbc2f7c7fe93f168a376e587e65de0e7e6136e74218f76d0e8e052f125464b460305793560c32f197ab39b6fddfcf1b2616e40add92d4831d4815e78dc99c5eba95ebf4e5940e2335a489774871ec861a575747ee1cfdd220be5859cdaaf3a02cc1a121b2304290dad918bea71d22613cac3c39cb04790f5e6c7f24708a66ab7f7700d9f4d7c71bd060deca06eb30e55586d921c693ceacfa476b0a82b38391eb238a7351c906d67a9dfde96ca1d23f895cb8832fbc37f796668c4b1041f11a792c41130c2909143a81fc7a9597180595a67f81f577906bbad92204def46e64ac4e6b8fce29d7a2613f2f32e9c5070bf8a73424adb69f4f9d800101476f00c1b46d45f2e4598a424c19dfb4c6ee352e9712ff1bc161d8ba74a8e2a0d987188fa5e604c91d032af9ef5ba16fb98be9ca1d876ad5fd48fd1877bfbcb702e35aaae57c3c6f85afbd96c4fad8a55a22e93278dc7319b4d602aacb15d8109ebc754b0917db8a024bbc68d33c72b30b1c4b311065be52777e898629ba79af1438ae2bb338b2c25c6dea01ea951d8f80d7337326f67a31120faaa5e9a4f87d3a48d70fdedb05c6d16ce4449b252836991b65899047cc72ef4074891a8043a7c400ec105b050a523ec4495f12d4ef7ea5e5c4258b52924b9a7217d9404f65385b00edfeae1b580b5827f6e1826d5af08b69328658b17b8ff655da9d0e4d63c87e9485ecd86907b846cac91f21d6627119f2a886b09cdb8510e065bb1ca8127b4e8290b27ea6ebd3df36cd1c5580b45ec7d3cc948efe8e14057d8b90de2c585a3d99984d8a9c516aafb0e1d52f556ebed74a48020e0bd541142d1e077a504338ba71be78eea848f302f3fc8cd2296e56866cbaf3ac300f1da2f9a8bae6d85b95077fc0bb717809046eba7021316371778ee343c432a733806520e10759f07cab492d35fe1912fb6fc51022d05a731c30ef26dee1572612f3d3df3f0502e37ee5d18ccb824b31797ea331e15f62234efab4e67218cc973ec566a7d3a7cb91f95ff90c8133ac8c3c9713618de84a2f196c138be64375873d1e9f16c4e138ed77ddb41f0b1da9d334cd58fd2c452b0c26c07a50c41f3980ec37747ec25f85ae1172b30b0d21b301afd7be29f4a04d0912b80256983668fe28e14b6fa287e587858343263878d2ea7e5c3ddd2fecdffd6f322f44a590f4ceb10f114ef08f652066a61de80c0c6f53fec9aa9e6f6a214a051a26ffa0459bedc41a54dbbe6135c4da47dd9eec60e9b1092c10cdf3980698481510f139de32ec4df64d5bc2e7d0ee1a845ae98e39406f16b93012c7b5f232a5d6ce325fbeca8c2cb045c7bafde63293bafd5471d80932a0253f80380241759689f22ccddbf7f993f0ed2cb80b09ebd26323531235517f599b3350b9ce4cd9118a373c8fa83a16cd4e96ce17778d329c53b4fa8bb51e8b4e1e7b836b6016512400e919a89b557646240dcd8646d56ea3ead156611f1433e31b0bcdcdd524652cc76887308874455d4a59c60344ffa2416dc8f0553641b0f97109425134f5308810fc75ac813a4e7a64a2187a2e3a33c5ddc6a5217dfa0c8707d9da5e2265c7917098c66ecc993ad91faa00598c0243b5439cc7a22eec87b1935121e803f1ea13921baa236b5f67c50ea9ac5ed1c46ee275aeb93ec46a9446fda73f30e24d3f9ce1ce92eb9c4525b02ae65e2a3206457b50587cbb4e67137f3fa432549d2744891a17b8581e180850432ee83b2eeaad0aadf9c2d84f43f0fe02ab5d4de96e8b536146772744ec94ffcecc146803ceb9845ab77d2a98bb2576825ec99e71faa9737b8a83ebe2db317f11edba986e538547059da4abe3dcdee4f955ef1cf86a146968d1537f2da6430959c2df6589672dc525d3e9badd14a0dc60abe7be4d64091e64f9bf33dabd8ecf9897de338a126d1e4c3ff78356546f1bd351ce5d953a5104302e9ac45b0ee633fb769c39d3c0774a548b95e821ce3912874"}, 0x1015) r1 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020000001800030500000012000000000a800000000000080000000004000800"], 0x20}}, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) [ 3025.748833] kauditd_printk_skb: 151 callbacks suppressed [ 3025.748842] audit: type=1400 audit(1536420430.019:27826): avc: denied { map } for pid=15340 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3025.830127] audit: type=1400 audit(1536420430.059:27827): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3025.900718] audit: type=1400 audit(1536420430.059:27828): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3025.950101] audit: type=1400 audit(1536420430.059:27829): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3026.000094] audit: type=1400 audit(1536420430.089:27830): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3026.050115] audit: type=1400 audit(1536420430.089:27831): avc: denied { map } for pid=15340 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3026.074368] audit: type=1400 audit(1536420430.129:27832): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3026.099569] audit: type=1400 audit(1536420430.129:27833): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3026.124489] audit: type=1400 audit(1536420430.139:27834): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3026.149662] audit: type=1400 audit(1536420430.139:27835): avc: denied { map } for pid=15340 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:27:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x3fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) r4 = getpid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sched_setscheduler(r4, 0x5, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x7, 0x4e20, 0x0, 0x0, 0x0, 0xa0}, {0x0, 0x0, 0x119}, {}, 0x5592, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@rand_addr}, 0xa, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x80}}, 0xe8) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYBLOB]) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)) 15:27:10 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000240)=0x78) pwrite64(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='\x00', 0x1, 0x2) 15:27:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x4, &(0x7f0000000380)=0x1, 0x4) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x5) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240)=0x4, 0x4) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') sendfile(r3, r3, &(0x7f0000000340)=0xffffffd, 0x7ffffffb) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000280)=0x1) fcntl$notify(r2, 0x402, 0x0) r4 = getpid() ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000002c0)={[], 0x8, 0x7fff, 0x4, 0x4, 0x7, r4}) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000400)=""/45) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBLED(r1, 0x4b65, 0x7) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r5, 0x80080) [ 3031.546595] kauditd_printk_skb: 23 callbacks suppressed [ 3031.546604] audit: type=1400 audit(1536420435.819:27859): avc: denied { map } for pid=15354 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3031.641724] audit: type=1400 audit(1536420435.839:27860): avc: denied { map } for pid=15356 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3031.730124] audit: type=1400 audit(1536420435.839:27861): avc: denied { map } for pid=15356 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3031.800095] audit: type=1400 audit(1536420435.839:27862): avc: denied { map } for pid=15356 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3031.890130] audit: type=1400 audit(1536420435.839:27863): avc: denied { map } for pid=15356 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3031.998723] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3031.998730] audit: audit_lost=376 audit_rate_limit=0 audit_backlog_limit=64 [ 3031.998734] audit: backlog limit exceeded [ 3032.005044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3032.005051] audit: audit_lost=377 audit_rate_limit=0 audit_backlog_limit=64 15:27:16 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(r2, 0x5, &(0x7f0000000080)) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000000c0)=""/24) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='\x00', 0x1, 0x0) 15:27:16 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000480)={0x10000, 0x0, 0x0, &(0x7f0000000440)}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'vlan0\x00'}) 15:27:16 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x622000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='yeah\x00') r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x90000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x80, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:27:16 executing program 7: r0 = socket$inet(0x2, 0x200000002, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21}, 0x10) r2 = dup2(r0, r1) sendto$inet(r2, &(0x7f0000000180), 0x0, 0x8000, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) setsockopt$inet_udp_int(r2, 0x11, 0xb, &(0x7f0000000080), 0x4) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 15:27:16 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000140)) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000100)=""/18) 15:27:16 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd630120"], &(0x7f0000000000)="47504c00bc2e070000004823122000000000000000000000000000", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000080)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x283, &(0x7f0000000300)=""/187}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:27:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000185fb9d4b1c03400010500000000000000000a8100000000000800000000040008002e8dcaa831990e8052303de3be5869fa9d89ef1f13fb944616e48fd3ea2dbbc1e5c671b837c5d4cf3a048d692c4c80f6b4fbc1696725f6438af1e23a869dc64c55d54c032661b55f7c362950157c6ebd244301a336d328ada246db4147e7138973885b953996b22d1ca9f415efc69f217bedeedce7f060376a58475839800cc6f78a9a43fde1d6ff434a0a9a860d4de080baf728fae8a9f50825e747ade412660f59d642e348e0bb5c0afb1c4e8cf484592f"], 0x20}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80001}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="040027bd7000ffdbdf250800000034000100080002003c0000000800010002000000080004004e240000080009003800000008000b007369700008000800e50000000800060037440000"], 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 3032.962897] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24344 sclass=netlink_route_socket pig=15371 comm=syz-executor6 [ 3033.063567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=15373 comm=syz-executor6 15:27:17 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(r2, 0x5, &(0x7f0000000080)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x210000, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 3033.186065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24344 sclass=netlink_route_socket pig=15371 comm=syz-executor6 15:27:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001800010500000800000000040008000000000000000000000000000041f2eddd89c0e13028c8689230d438c3f540b8a57b9674b8c83fbda18ce8baf3e5092fe4b0c2c6fe8616fcb29cc6093943478f"], 0x20}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$VT_RELDISP(r1, 0x5605) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000100)={0x5, 0x5, 0x1, 0x8, 0x4, 0x56b, 0xd1e869d, 0x1fc, 0x636167f2, 0x4, 0x1, 0x80}) 15:27:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x806) bind$netlink(r0, &(0x7f0000000300)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000180000080000000004000800"], 0x20}}, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0xa00, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000001c0)="966ef9b090911680d34c437fac172bfd1022d01dc4bdc23d2c5466da71b97a69ec35841bb62b51f019b3742dabc4659357326342f44a8e07151398ccef78a465731dbff5414d1918f71be267842fc925918c0458441703269e98521e6dfa8172f0bda391a374c9d25e6768c36e1d97482dee1c1d5e8a2b45afc68b3dcb02e2b6cd6c0fc396076a5621144f026be67e431d9d839645bd3a3309ddaea83bfa0b28e558bfe6b7e773ca5b9e08793b9f6f2e4b4bbcefa02f0c1c66a500") stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)) setsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000100)=0x81, 0xffffffffffffff90) 15:27:18 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffd) r1 = signalfd(r0, &(0x7f0000000100)={0x2}, 0x8) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x1, 0x4) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a8000000d0000080000000004000800"], 0x20}}, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) pwrite64(r0, &(0x7f00000001c0)="2a07d3029071a9d162a1a5c10f6732afbce06f9405e5f7ca58e466337dd9e53dd951defab038db50ff44fac5bdfa58299ef1544a8c569062ab1813a06e1435c90270f13b9f86096e86abbe3fc0c9885d508a8cc386ab57c8a156d1eb2fb0770b57d83ee072e03a9702a9ce569f55423f7677922113a9563f2d31dfe5b96ec599cfdf639273c072eb43608c1193d3724b373e2528b95e7594ad378280d2c0de3fd71e68a47d20531e6dc6", 0xaa, 0x0) 15:27:18 executing program 6: prctl$intptr(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000184ea990add13f66b100010500000000000000000a800000000000080000000004000800"], 0x20}}, 0x0) [ 3034.274244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19992 sclass=netlink_route_socket pig=15389 comm=syz-executor6 15:27:18 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) r1 = getpgrp(0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r2}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x80800, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x8, 0x62, 0x7, 0xfffffffffffffff8, 0x0, 0x8001, 0x20680, 0x1, 0x7ff, 0x3, 0x8, 0x69e, 0x6, 0xcb, 0x0, 0x7ff, 0xfffffffffffffffe, 0x5e088ce1, 0x6, 0x2, 0x8, 0x7fff, 0xfffffffeffffffff, 0x400, 0x0, 0x8000, 0xaa, 0x100000001, 0xfffffffffffffffe, 0x5, 0xfffffffffffff5a1, 0x3f, 0x100000001, 0x9e, 0xb8, 0x3e, 0x0, 0x100000000, 0x0, @perf_bp={&(0x7f0000000000), 0xd}, 0x10, 0x0, 0x80000001, 0x7, 0x4, 0x6, 0x400}, r1, 0x5, r3, 0x9) [ 3034.322136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19992 sclass=netlink_route_socket pig=15390 comm=syz-executor6 [ 3041.849293] kauditd_printk_skb: 213 callbacks suppressed [ 3041.849302] audit: type=1400 audit(1536420446.119:28052): avc: denied { map } for pid=15403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3041.930108] audit: type=1400 audit(1536420446.139:28053): avc: denied { map } for pid=15403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3041.990098] audit: type=1400 audit(1536420446.139:28054): avc: denied { map } for pid=15403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.040086] audit: type=1400 audit(1536420446.139:28055): avc: denied { map } for pid=15403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.110105] audit: type=1400 audit(1536420446.169:28056): avc: denied { map } for pid=15403 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.180093] audit: type=1400 audit(1536420446.169:28057): avc: denied { map } for pid=15403 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.250094] audit: type=1400 audit(1536420446.169:28058): avc: denied { map } for pid=15403 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.340133] audit: type=1400 audit(1536420446.179:28059): avc: denied { map } for pid=15403 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.430088] audit: type=1400 audit(1536420446.179:28060): avc: denied { map } for pid=15403 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.500097] audit: type=1400 audit(1536420446.199:28061): avc: denied { map } for pid=15403 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:27:30 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bond\x00', 0x3}) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000240)={'mangle\x00'}, &(0x7f00000002c0)=0x54) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) 15:27:30 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000070000000104000000000000000000000000000006000000000000000800000000000000000000000000000000280000000000000000000000000000070000003f0000008100000000000000faffffffffffffff4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="2080000000000008000000000400080000000000000000000000000000000000"], 0x20}}, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000500)=0x7) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x400, 0x0) socketpair(0x11, 0xa, 0x9, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x84d, 0x0, 0x1, r2}) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x37, 0x200, 0x70bd29, 0x25dfdbfc, {0x13}, [@typed={0x14, 0x1d, @ipv6=@dev={0xfe, 0x80, [], 0x21}}, @generic]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x800) [ 3046.045793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15418 comm=syz-executor6 [ 3046.125120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55 sclass=netlink_route_socket pig=15419 comm=syz-executor6 [ 3046.851981] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15422 comm=syz-executor6 15:27:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) flock(r0, 0x1) [ 3049.259421] kauditd_printk_skb: 120 callbacks suppressed [ 3049.259430] audit: type=1400 audit(1536420453.529:28182): avc: denied { map } for pid=15424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.310112] audit: type=1400 audit(1536420453.579:28183): avc: denied { map } for pid=15424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.370120] audit: type=1400 audit(1536420453.579:28184): avc: denied { map } for pid=15424 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.420885] audit: type=1400 audit(1536420453.579:28185): avc: denied { map } for pid=15424 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.470092] audit: type=1400 audit(1536420453.599:28186): avc: denied { map } for pid=15424 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.520081] audit: type=1400 audit(1536420453.599:28187): avc: denied { map } for pid=15424 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.570073] audit: type=1400 audit(1536420453.599:28188): avc: denied { map } for pid=15424 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.620102] audit: type=1400 audit(1536420453.619:28189): avc: denied { map } for pid=15424 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.645606] audit: type=1400 audit(1536420453.619:28190): avc: denied { map } for pid=15424 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.670107] audit: type=1400 audit(1536420453.639:28191): avc: denied { map } for pid=15424 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.061530] kauditd_printk_skb: 92 callbacks suppressed [ 3056.061538] audit: type=1400 audit(1536420460.339:28284): avc: denied { map } for pid=15435 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.140097] audit: type=1400 audit(1536420460.369:28285): avc: denied { map } for pid=15435 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.190109] audit: type=1400 audit(1536420460.369:28286): avc: denied { map } for pid=15435 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.240086] audit: type=1400 audit(1536420460.369:28287): avc: denied { map } for pid=15435 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.290082] audit: type=1400 audit(1536420460.389:28288): avc: denied { map } for pid=15435 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.340901] audit: type=1400 audit(1536420460.389:28289): avc: denied { map } for pid=15435 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.367545] audit: type=1400 audit(1536420460.389:28290): avc: denied { map } for pid=15435 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.392261] audit: type=1400 audit(1536420460.409:28291): avc: denied { map } for pid=15435 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.417264] audit: type=1400 audit(1536420460.409:28292): avc: denied { map } for pid=15435 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3056.441739] audit: type=1400 audit(1536420460.499:28293): avc: denied { map } for pid=15435 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:27:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@mcast1, @mcast2, @empty, 0x40, 0x8, 0x1, 0x0, 0x5, 0x1010201, r1}) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f0000000000), 0x0) 15:27:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) 15:27:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000000)) 15:27:43 executing program 7: mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f000003cff6)='./control\x00', 0x220001a1) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) 15:27:43 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f0000000100)="050b1784b90736a097a4a050b26d75f5d0e43ba80f2dd518a2c7fc95c76fbfc75b32e7393457e9a3269bbfb78a2f828f2e3adb2c12511f9265e19e2e53b8551fd818c96d99cdfe634c2a0f07f1a1a8a720c8ef06f52447ab8580a52964f1cbfe56ae87978cc9f257b0ad3ef9391528245ac7243a") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000018000105000000bb038c03000a000000040008000000000000000000"], 0x1}}, 0x4000000) 15:27:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0a5c2d0252926285717070") sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000061a2561c4e8e34994a29080000000a886e26201fa6f084e046b743156b"], 0x21}, 0x0) recvmsg(r1, &(0x7f0000000440)={&(0x7f00000002c0)=@pppol2tpv3in6, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000980)=""/142, 0x8e}, 0x40000000) 15:27:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001800010500000000000000000a800000000000080000000004400800ded100dc835065a1440f767d37f851895d7bc751e1cc19b7712f270c0400bd60845fa92dc1a0504ee3992e60503da28ac8e80c8b9436046c55d6672ec128f8951b272ddac9e8f1652af127b409ed19f5a949ccec2f95776eee2e6546bdd7ff6b337f22f82e779486012943a9a22dca4c51d8c527451ff46dbccd7b59dcac5833fc5e3e7312924b1c85e3d08ec4ab1cf74f87bf9c860750229f4ef462f409fc17eb768a0bfc2ff0e5cfe0a57f0c669c4d28000091cec2e5e17b6e11000000000000000000000000"], 0x20}}, 0x0) [ 3059.953870] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 3059.983711] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 15:27:44 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400000, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000100)=0x4, 0x4) inotify_init1(0x80800) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:27:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0x352, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:27:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0xffffffffffffff55}}, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000001c0)=""/71) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 15:27:45 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x15) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200041, 0x0) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x3}, {0x6}]}) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="20801d0018050040000008bd91e63de4d71c3bba1171e3e3d8790000000000000000e2ff0000000000080000000000798c75cb3d5cd3a451aa1192e0a9fd2ec698b9d145271b6f54ac02950da0b85c4aa500004d729155cf9be29222"], 0x20}}, 0x0) [ 3061.091868] kauditd_printk_skb: 85 callbacks suppressed [ 3061.091876] audit: type=1400 audit(1536420465.369:28379): avc: denied { map } for pid=15473 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:27:45 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xe) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 3061.180091] audit: type=1400 audit(1536420465.409:28380): avc: denied { map } for pid=15473 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3061.280135] audit: type=1400 audit(1536420465.409:28381): avc: denied { map } for pid=15473 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3061.363840] audit: type=1400 audit(1536420465.409:28382): avc: denied { map } for pid=15473 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3061.440087] audit: type=1400 audit(1536420465.419:28383): avc: denied { map } for pid=15473 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:27:45 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0xfefe) socket$packet(0x11, 0x3, 0x300) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r0, r1, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r0, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) [ 3061.554425] audit: type=1400 audit(1536420465.419:28384): avc: denied { map } for pid=15473 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3061.663232] audit: type=1400 audit(1536420465.449:28385): avc: denied { map } for pid=15473 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3061.750084] audit: type=1400 audit(1536420465.489:28386): avc: denied { map } for pid=15473 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3061.820090] audit: type=1400 audit(1536420465.509:28387): avc: denied { map } for pid=15473 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3061.879077] audit: type=1400 audit(1536420465.669:28388): avc: denied { map } for pid=15475 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:27:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000140)="f66c6bcb030300008e46bd46cf070024f6c94c5184", 0x15) 15:27:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0xffffffffffffffff, r0, &(0x7f0000000080), 0x0, 0x8) [ 3066.448708] kauditd_printk_skb: 118 callbacks suppressed [ 3066.448717] audit: type=1400 audit(1536420470.719:28507): avc: denied { map } for pid=15491 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.500100] audit: type=1400 audit(1536420470.739:28508): avc: denied { map } for pid=15491 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.550086] audit: type=1400 audit(1536420470.739:28509): avc: denied { map } for pid=15491 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.600251] audit: type=1400 audit(1536420470.739:28510): avc: denied { map } for pid=15491 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.650086] audit: type=1400 audit(1536420470.759:28511): avc: denied { map } for pid=15491 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.700099] audit: type=1400 audit(1536420470.759:28512): avc: denied { map } for pid=15491 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.750077] audit: type=1400 audit(1536420470.779:28513): avc: denied { map } for pid=15491 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.800091] audit: type=1400 audit(1536420470.779:28514): avc: denied { map } for pid=15491 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.850129] audit: type=1400 audit(1536420470.779:28515): avc: denied { map } for pid=15491 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3066.900119] audit: type=1400 audit(1536420470.859:28516): avc: denied { map } for pid=15491 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:27:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000140), 0x4) [ 3071.477710] kauditd_printk_skb: 41 callbacks suppressed [ 3071.477719] audit: type=1400 audit(1536420475.749:28558): avc: denied { map } for pid=15496 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.530143] audit: type=1400 audit(1536420475.779:28559): avc: denied { map } for pid=15496 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.575309] audit: type=1400 audit(1536420475.789:28560): avc: denied { map } for pid=15496 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.630893] audit: type=1400 audit(1536420475.789:28561): avc: denied { map } for pid=15496 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.680084] audit: type=1400 audit(1536420475.789:28562): avc: denied { map } for pid=15496 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.722371] audit: type=1400 audit(1536420475.799:28563): avc: denied { map } for pid=15496 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.755960] audit: type=1400 audit(1536420475.799:28564): avc: denied { map } for pid=15496 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.810105] audit: type=1400 audit(1536420475.829:28565): avc: denied { map } for pid=15496 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.834702] audit: type=1400 audit(1536420475.829:28566): avc: denied { map } for pid=15496 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3071.859353] audit: type=1400 audit(1536420475.839:28567): avc: denied { map } for pid=15496 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3076.827995] kauditd_printk_skb: 102 callbacks suppressed [ 3076.828004] audit: type=1400 audit(1536420481.099:28670): avc: denied { map } for pid=15503 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3076.870095] audit: type=1400 audit(1536420481.139:28671): avc: denied { map } for pid=15503 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3076.920097] audit: type=1400 audit(1536420481.139:28672): avc: denied { map } for pid=15503 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3076.970097] audit: type=1400 audit(1536420481.139:28673): avc: denied { map } for pid=15503 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3077.020094] audit: type=1400 audit(1536420481.139:28674): avc: denied { map } for pid=15503 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3077.061829] audit: type=1400 audit(1536420481.179:28675): avc: denied { map } for pid=15503 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3077.087786] audit: type=1400 audit(1536420481.179:28676): avc: denied { map } for pid=15503 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3077.120095] audit: type=1400 audit(1536420481.179:28677): avc: denied { map } for pid=15503 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3077.145977] audit: type=1400 audit(1536420481.179:28678): avc: denied { map } for pid=15503 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3077.170488] audit: type=1400 audit(1536420481.239:28679): avc: denied { map } for pid=15503 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:28:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x622000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='yeah\x00') r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x90000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x80, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 15:28:05 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@newae={0x40, 0x1e, 0x21, 0x0, 0x0, {{@in6=@ipv4={[], [], @dev}}, @in6=@mcast1}}, 0x40}, 0x8}, 0x0) 15:28:05 executing program 6: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="88f0ace5a0a6471e3edd7e930e4b8209", 0x10) [ 3082.423852] kauditd_printk_skb: 30 callbacks suppressed [ 3082.423862] audit: type=1400 audit(1536420486.699:28710): avc: denied { map } for pid=15519 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.470198] audit: type=1400 audit(1536420486.699:28711): avc: denied { map } for pid=15519 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.530101] audit: type=1400 audit(1536420486.699:28712): avc: denied { map } for pid=15519 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.570101] audit: type=1400 audit(1536420486.699:28713): avc: denied { map } for pid=15519 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.630093] audit: type=1400 audit(1536420486.699:28714): avc: denied { map } for pid=15519 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.670104] audit: type=1400 audit(1536420486.739:28715): avc: denied { map } for pid=15519 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.710086] audit: type=1400 audit(1536420486.739:28716): avc: denied { map } for pid=15519 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.761029] audit: type=1400 audit(1536420486.739:28717): avc: denied { map } for pid=15519 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.785774] audit: type=1400 audit(1536420486.749:28718): avc: denied { map } for pid=15519 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.810492] audit: type=1400 audit(1536420486.779:28719): avc: denied { map } for pid=15519 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3082.977687] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 3087.799203] kauditd_printk_skb: 100 callbacks suppressed [ 3087.799211] audit: type=1400 audit(1536420492.069:28820): avc: denied { map } for pid=15547 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3087.870102] audit: type=1400 audit(1536420492.119:28821): avc: denied { map } for pid=15547 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3087.930102] audit: type=1400 audit(1536420492.119:28822): avc: denied { map } for pid=15547 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3087.980096] audit: type=1400 audit(1536420492.119:28823): avc: denied { map } for pid=15547 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3088.030891] audit: type=1400 audit(1536420492.139:28824): avc: denied { map } for pid=15547 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3088.080164] audit: type=1400 audit(1536420492.139:28825): avc: denied { map } for pid=15547 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3088.130163] audit: type=1400 audit(1536420492.139:28826): avc: denied { map } for pid=15547 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3088.180127] audit: type=1400 audit(1536420492.179:28827): avc: denied { map } for pid=15547 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3088.204738] audit: type=1400 audit(1536420492.179:28828): avc: denied { map } for pid=15547 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3088.229277] audit: type=1400 audit(1536420492.259:28829): avc: denied { map } for pid=15547 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:28:14 executing program 7: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='sched\x00') syz_open_pts(r1, 0xc00) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0xc1, 0x0, &(0x7f0000000180)="1aa346327176417cc70d05cb8d732cb1f102fb4aee379940f1cd956ca70f629dd35512c0f4f0ac23f542c9d20d327b7522d6b8540bcdeaf8f36e8f8058aa14288c158dc61a1e9762fc104dfff5800964974d9e9fb08e57f0f14f7505cd018a451c48c4f856f7b6984a80875f7aecbfa58866610356aae21b9f3968dad04ed9128d1527ade5653ab6a32a9210dd8894b83e0f07cbe319d2b972609d0cb973e9e7d6059a8e2167d0a119cb3fc1a41728b34302f7f6a6f971fef33eca743b8718bbfb"}) 15:28:14 executing program 6: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x1, r1}, {0x2, 0x1, r2}, {0x2, 0x1, r3}, {0x2, 0x5, r4}], {0x4, 0x6}, [{0x8, 0x7, r5}], {0x10, 0x2}, {0x20, 0x2}}, 0x4c, 0x2) sched_setscheduler(r0, 0x0, &(0x7f0000000040)) rt_sigaction(0x0, 0xfffffffffffffffd, &(0x7f0000000180)={&(0x7f0000000100)="c4a18f5c05a2010000c4417ae67cf60847a7c4217c532a400f1533c09e19ace34800c4a1791714798f6808eed500c4a17d7f1de9b6534d0f01ef", {}, 0x0, &(0x7f0000000240)="663ef247ad440faefac461796f70b0f344aa6598c4839979d803c421cdfc7e08c42141ea8455d697df1d6442801a05660f3a63e800"}, 0x8, &(0x7f00000001c0)) 15:28:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000240)={0x101, 0x81, 0xfffffffeffffffff}) r3 = openat$cgroup_ro(r1, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)={0x15, 0x65, 0xffff, 0x1, 0x8, '9P2000.L'}, 0x15) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pread64(r1, &(0x7f0000000300)=""/79, 0x4f, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x480, 0x140, 0x140, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000380), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="8fed2ef02c53", @multicast2, @loopback, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @broadcast, 0xa}}}, {{@arp={@loopback, @multicast1, 0xff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0x0, 0xff]}, 0xffff, 0x79ed, 0x9, 0x3, 0x1, 0x200, 'nr0\x00', 'syzkaller0\x00', {0xff}, {0xff}, 0x0, 0x29}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) close(r6) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000900)={r3, &(0x7f00000008c0)="6b7f60dabbf35a7feeb81671d656ce59a253630b4aae40cf382df28ae71698f00a2170baabcbd257ffd705bb65ec8a64"}, 0x10) write$uinput_user_dev(r1, &(0x7f0000000940)={'syz0\x00', {0x1, 0x2, 0x7, 0x2}, 0x1e, [0x4, 0x9, 0x100000000, 0x0, 0x80, 0x6, 0x10001, 0x8, 0x1, 0x2ed0, 0xb1f, 0x6ef, 0x10000, 0x0, 0x1, 0x8, 0x5, 0x80000000, 0x1, 0x6, 0xffffffff, 0x3ff, 0x400000000000000, 0x40, 0x6, 0x7, 0xa5fe, 0x0, 0x3ff, 0x401, 0x0, 0x7, 0x3, 0x4, 0x4, 0x100000001, 0x100000000, 0xfffffffffffffffd, 0x2, 0x2, 0x3, 0x3, 0x3, 0x0, 0x4, 0x698e, 0xb1, 0x0, 0x2, 0x7, 0x3ff, 0x5, 0x7fffffff, 0x1ff, 0x6, 0x2, 0x401, 0x1000, 0x9, 0x400, 0x401, 0x1000, 0x8, 0x401], [0x81, 0x10001, 0x4, 0x3, 0x6, 0x5, 0x5, 0x7, 0x3, 0x8, 0x9f, 0x1f, 0xf511, 0x7, 0x7, 0x2, 0x0, 0x9, 0xf9, 0xb4f, 0x3f, 0x0, 0x200, 0x1ff, 0x81, 0x0, 0x8, 0x7e3a, 0x0, 0x1, 0xfffffffffffffc01, 0xfc73, 0x3f, 0x8, 0x3, 0x40, 0x9, 0xbe97, 0x6, 0x7, 0x0, 0x6, 0x5, 0x3, 0x8, 0x8001, 0x10001, 0x100000001, 0x3ff, 0xffff, 0x2, 0x1000, 0x7, 0x6, 0x20, 0x9, 0x75b, 0x1c, 0x7fffffff, 0x1, 0x9, 0x0, 0x52f77a58], [0x276a0bc5, 0x10000, 0x1000, 0x100000001, 0x9, 0x3, 0x6, 0x1, 0x0, 0x41, 0x800, 0x100000001, 0xffffffff, 0x9, 0x5, 0xe096, 0x0, 0x5, 0x100000001, 0x95, 0x81, 0x9, 0x5, 0xffffffffffffffff, 0x8, 0x8000, 0x2, 0x7, 0x4, 0x73c0, 0x3, 0x8, 0x7, 0xfffffffffffffff7, 0x5, 0x6, 0x200, 0x1ff, 0x73f4, 0x1, 0x0, 0x8000, 0x8, 0x5, 0xc8d6, 0x81, 0x3ff, 0x100, 0x3, 0x2, 0x6, 0x0, 0xffff, 0xe8, 0xfffffffffffffff9, 0x3, 0x40, 0xfff, 0x9, 0x200, 0x5, 0x1733, 0x5, 0x5], [0x2, 0x1f, 0x1, 0xc919, 0x4ecac08, 0x3ff, 0x4, 0x8, 0x2, 0x1, 0x100000001, 0x1, 0x4, 0x0, 0x4, 0xc1c, 0xfff, 0x401, 0x4, 0x7, 0x0, 0x5, 0xfffffffffffffffb, 0x1, 0x1, 0x8001, 0x3, 0x7, 0x8, 0x4, 0x80000000, 0x3, 0xf65d, 0x3, 0x3, 0x7, 0xc1, 0x2, 0x3, 0x0, 0x3f, 0x52b5, 0x6, 0x100, 0x5, 0xbf2, 0xff, 0x2, 0x6, 0x1, 0x0, 0x1, 0x4, 0x7, 0x0, 0x0, 0x8, 0xffffffffffffff7d, 0x2, 0x200, 0x2b, 0x5, 0xfffffffffffffffc, 0xc000000]}, 0x45c) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000dc0)) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xc) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000e00)={{0x84, @rand_addr=0x9, 0x4e24, 0x4, 'wlc\x00', 0x13, 0x3, 0xd}, {@multicast2, 0x4e20, 0x1, 0x4cfd, 0x20000000000000, 0x1}}, 0x44) r7 = geteuid() ioctl$TUNSETOWNER(r3, 0x400454cc, r7) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000e80)) writev(r5, &(0x7f0000001200)=[{&(0x7f0000000ec0)="30dcdb6343c5e4eb9411d518225b81c4a1fdd121836ba038ac65cdb1c8e5967c06241d898ffb322921404458f1d9feaedbb2d24c188073ec96f4693fbf833bb60d0066591ec208a0e39271edabaaf4d0a673404a3db2663d7563bca7f8cbf079de5a072266a652f1ffc80fa17f2d1fdfa561df8739bf781eb30fc259a99377e4ee147eb8a2717601", 0x88}, {&(0x7f0000000f80)="8c3814b00e2bcdd076a45fa1ba3723f4cc9056b0bece0437899d40300de82a35656bf18fdb10758865cd29bdd603f46ea4207cb192f494dc25f4dc2d6c91259fbe268650384e3b6b53ccd6af19bb0ef690720454b9e7d47e5b60729b04029d9ac6a0", 0x62}, {&(0x7f0000001000)="73a1b79640cebec7468cfa4886112000ef8be8fd96b66510967da203ddf5a90ca49a4b0d02a2812577f4920fc73fef1c77db9001933d1840d958b4790bf86f8a6a32c7399bcd94bbcdd3d0cf6390bb8cb166fc8b1030f466c82d66578508f1f46ac03ded2ae2c1fb582d1d3d30f99f16bf2a15ba81f149182f2ca1a48906046f828f284ca92dc8537e66d8dff27e416054364249f695169e0c8e3ee6bc4be5cb3437585c963fa59385283ea987c77dfb2f19662b2e3394a29e612e61646ffd3e469446f883fa21e4d7d362f23138c6", 0xcf}, {&(0x7f0000001100)="671013f9125eda8b617c08ca2c1cc7023f30b783b612457fc613b49a0cfb45f2956f5901caea73410987c5f18213420b673a0409727bedea0dcf1b6836cfff47f88a3a58295b58b3bd5fb939151e0d07644a29ca3fd56e066149f32a39e0b9e45d308146c07e5be90d4a2735a50075f9c242988e5f87359621004537", 0x7c}, {&(0x7f0000001180)="afd0cffbd0617cefbad8f14436de711ce8f1c1a248e172a21966aa239e9122d1462381b20ece550d2e454098b1bd4013914b98262129f67efcde6a8a1f830b93a019", 0x42}], 0x5) ioctl$KIOCSOUND(r2, 0x4b2f, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000012c0)={&(0x7f0000001280)='./file0\x00', r3}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000001300)={0x0, @aes256}) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000001380)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000001480)={&(0x7f0000001340), 0xc, &(0x7f0000001440)={&(0x7f00000013c0)={0x4c, r8, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) write$uinput_user_dev(r1, &(0x7f00000014c0)={'syz1\x00', {0x3, 0x0, 0x0, 0x4}, 0x22, [0x7f, 0x65, 0x5, 0x400, 0x8, 0x0, 0x7, 0x5, 0xfffffffffffffffb, 0xdd, 0x43, 0x9, 0xc2, 0x5, 0x9, 0x2, 0x800, 0x5, 0x0, 0x2, 0x3, 0xe54, 0xfffffffffffffffd, 0x5, 0x2, 0x4cf3, 0x100000000, 0x7, 0xffffffffffff8000, 0x3, 0x100000001, 0xa229, 0x4, 0x9, 0x400, 0x1, 0xfffffffffffffffa, 0x7, 0xffff, 0xffffffffffffff81, 0x4, 0x5, 0x10000, 0x6, 0x6, 0x6, 0x9, 0x7, 0x6, 0x1, 0x2, 0x0, 0xfffffffffffffffd, 0x3f, 0x44, 0x101, 0x3, 0x1000, 0x8, 0x2f3, 0x2, 0x6800000000000000, 0x2, 0x9], [0x1, 0xdb, 0x3ff, 0xec4d, 0x1, 0x8, 0x200, 0x100, 0x1, 0x80, 0x6, 0x2, 0x8, 0xe8d1, 0x8001, 0x9, 0x3, 0x800, 0x4, 0xffffffff7fffffff, 0x91c, 0x6, 0x26c0, 0x7f, 0x0, 0x0, 0x9, 0x1, 0xfffffffffffffffd, 0x9, 0xfffffffffffffff7, 0x0, 0x0, 0x3, 0x1329, 0x3, 0x0, 0x200, 0x3ff, 0x0, 0x44, 0x81, 0x7f, 0x1, 0x6, 0x2, 0x71bc, 0x7, 0x7fffffff, 0x2, 0x1, 0x7, 0x8, 0x9bcc, 0x3f, 0x6, 0xfff, 0x7fffffff, 0x1, 0xd32000000000000, 0x7f, 0x8, 0x6, 0xffffffffffffff80], [0x15, 0x5, 0x0, 0x5, 0x4, 0x0, 0x9, 0x5, 0xffffffff, 0x7, 0x7, 0x8, 0x8, 0x7, 0x4, 0x8, 0x7fff, 0x8, 0x5e, 0x9c, 0x6, 0x5, 0xf9bd, 0x8, 0xffffffff, 0xfff, 0x7, 0x2, 0x6, 0x8, 0xaf3b, 0xa84, 0x800, 0x5, 0x3, 0x6, 0x0, 0x7, 0x3, 0x45, 0x0, 0x1000, 0x1000, 0x3, 0x0, 0x5, 0x4, 0x8, 0x2a, 0x1, 0x1f, 0x20, 0x39, 0xc39, 0x4, 0x80, 0x5, 0x100000000, 0x3, 0xfffffffffffffffe, 0x5b, 0x4, 0x1, 0x200], [0x100000001, 0x3f, 0xf096, 0x4, 0x10001, 0x1000, 0xfff, 0xfffffffffffffba6, 0x8001, 0x100000000, 0x5, 0x400, 0x81, 0x5, 0x0, 0x0, 0x1ff, 0xffd2, 0x7fffffff, 0x8, 0x2, 0x40, 0x675, 0x9, 0x5, 0x17b, 0xfffffffffffffffc, 0x0, 0xff, 0x0, 0x3, 0x6280, 0x0, 0x6, 0x7, 0x1, 0x4000000000000000, 0x1000000000000000, 0x9, 0x7, 0xef, 0x20, 0x20, 0x1800000000, 0x0, 0x4, 0x0, 0x7fffffff, 0xff, 0x0, 0xcdb, 0x6, 0xff, 0x80000000, 0x10000, 0xffffffffffffff00, 0x4, 0x80000000, 0x267a, 0x3, 0x4, 0x471d0908, 0x80000001, 0x2]}, 0x45c) ioctl$KIOCSOUND(r1, 0x4b2f, 0x2b) 15:28:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) ptrace$cont(0x7, r3, 0xb9, 0x400) 15:28:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() sched_getparam(r1, &(0x7f0000000080)) sendmsg(r0, &(0x7f0000003880)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x2, 0x4, {0xa, 0x4e21, 0xe, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}, 0x8}}}, 0x80, &(0x7f0000002540)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="7cf7cdeee93abd650b0655ecfb50eff9f95323f9a3927782c796760f768bec5ec6f11df21797c78d5b04e42f3adec6da630ab667c1f7e34808ce1cee3293c8eba899aaf6ad71cacd0be7f62f17fa825b06f9f964715989fae8bfd1017e6ddcb2caba08f82f8adf9079bcdf5a9c597202612a75b9410934de50c79b25de6383669adf7b16ca19fa51a0cf272a9b68d2acaa57d141549ee010bb730060ac9d4a3b841618e0e84063d58179991b25531d234b041a656458269187993fe2e99abfc5a4dee1b1ed710eac34fff073b512f0ce28d2c76d1d1ee8c1", 0xd8}, {&(0x7f0000001300)="95edd261487528f6d4eea5929f9a7fb51c1f199bedcb7bae955ded7ee750a020ec50ea73d3bcf958c86d745ba440ca609e92ec517db297ff5499b15382", 0x3d}, {&(0x7f0000001340)="5bf4dcea557a752400ab68e02054", 0xe}, {&(0x7f0000001380)="b573cee8987e0097563259abb36890943301fee68c876a05099e529bd9659d6287c476e765ddba2a13d053e4b9e1743262cbf83539a2999479c094d7c8b9d67fc5850a39f663693995f4735c8b9a1148f310f804bbaf394f0f690524e51d14350844f27f67588eed40bdac8abeecc328bbd11fe55126d2cde4e37227f57026844d4bc95f97a10993c6cc27f2a634c6ecdf07837278cde8178dd4c64dcbcf28b528e73fd34250fcea5e3045baf5b659bd1ce7549691bb", 0xb6}, {&(0x7f0000001440)="0d81231afdefd1a2b597e8f964db84345801b2a065014b55bad1bf0c0990e7593bb9bbf617990602c9ac2f83cb9f5ea17d7923b27a632fcce7673a64f40376ac41b9e81dee2a401b6e9f83bd549a4621660866525a296bb01fa39696977914dbe32cf9384e93d8f105668f2e54f67865a89c78154ee41663cf9cf3de32cba465d1355fea0fce6f8251c5f1895c9c3d27f1435c6d3ec94c0bb2e3d02a145680d05c82cf6070ca4b26baeb5b0f7217fa46f3b10df2010b46c9d12f9a19124f3c5f0b8ab871b51bdb233e2c25df4b8b43276ede5be7", 0xd4}, {&(0x7f0000001540)="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", 0x1000}], 0x7, &(0x7f00000025c0)=[{0x28, 0x114, 0x2, "f63ce61011e85a234a23f531961845a5742a199570e4fa04"}, {0x90, 0x118, 0x2, "54303107f98b83c8b3922eafb8e68c43852c4043270fa7a3b3d889d5b1f3f1443b0ddb11c74cd048d0acedafe9f358d8073ff3765ff49489194e18bf80c7e0db41e6ced37155b21e13a0b467d78047151e8441a4ffc1749b7d8a0eb6a42a8ec53bf96d20ae44bdda8e75774cfb99b7fdd676bf68fc1a838e4497"}, {0x100, 0x104, 0xff, "8e2fd13448bdc4a57bb1b923d2c3d56780fd179eadc9d4d6f871d063bc2b3c48dc93a9a59335210ae73164968f726c459dce5eb715bee02f4c21b6c33c4e2174276eb9cfd6c000c8988886403bd2bedf328427c33d5e0daa2cfcbd2f0dcd48053dee25c741195e1cca8eaac8129cea83b5ccc8860813929f3e38eed7837eab4e947599722162e2e253fea31427f53180b823438523bf593aadb369acecaa188ffe0280f435a45c47ab05f542c09e9afb6a7fdee88f9084324d821ae277714e7c44279c2287b41d454aa326715c402b9e60338b7cca6d938cfc61c33692013f0b3665d5f915508f6931844f46ee3e1e"}, {0x1010, 0x88, 0x9, "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"}, {0x68, 0x113, 0x81, "c177393d14ba11aeb325ecde913c4a896fbc1b5c815781e4e1cf60a36872c9e778b2cae6f29c06b3c94d39dd5dea620091729343cb1b6b7198727bc42effcef4a1ca08a5ef05dbf54afcdf74712aff721c"}, {0x90, 0x11b, 0x0, "5b5664d60a9eb11735ac9214ca247622768888f941f719b858c67dc024134830a50f26c3b7d162111bc5509877df1d19aa303ba5a373f4b260a8aff6e130434d7ef6a64a6fffdc509c072a77ee67769e6815f06deb9a4caddcf70c12a822bd2cc7eae978e485f0955b818913bc71b82c58563a91b4cd96ed47c83e09"}], 0x12c0}, 0x4000000) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000420007031dfffd946f61830002200a00090000e7fe1c40000c1ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ebea8653b1cc7e63975c02007b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 15:28:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b7020000fe000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x50d}, 0x0, 0x0, r0, 0x0) 15:28:14 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) getresuid(&(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) setresuid(r1, r2, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x6}, 0x10) setsockopt$sock_int(r0, 0x1, 0x800000002, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @remote}, 0x10) 15:28:14 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fadvise64(r0, 0x0, 0x0, 0x0) 15:28:16 executing program 6: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x154, &(0x7f0000000140)=@raw=[@jmp], &(0x7f0000000080)="288922320bcca3", 0x0, 0x1000, &(0x7f0000001240)=""/4096}, 0x1e) [ 3092.810545] kauditd_printk_skb: 26 callbacks suppressed [ 3092.810554] audit: type=1400 audit(1536420497.089:28856): avc: denied { map } for pid=15556 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:28:17 executing program 6: clone(0x1fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$notify(r0, 0x402, 0x0) [ 3092.910115] audit: type=1400 audit(1536420497.089:28857): avc: denied { prog_load } for pid=15559 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3092.980157] audit: type=1400 audit(1536420497.129:28858): avc: denied { map } for pid=15556 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3093.050107] audit: type=1400 audit(1536420497.129:28859): avc: denied { map } for pid=15556 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3093.119241] audit: type=1400 audit(1536420497.129:28860): avc: denied { map } for pid=15556 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3093.169570] audit: type=1400 audit(1536420497.139:28861): avc: denied { prog_load } for pid=15557 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3093.214434] audit: type=1400 audit(1536420497.159:28862): avc: denied { map } for pid=15556 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3093.264268] audit: type=1400 audit(1536420497.169:28863): avc: denied { map } for pid=15556 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3094.269788] audit: type=1400 audit(1536420498.539:28864): avc: denied { map } for pid=15567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3094.330100] audit: type=1400 audit(1536420498.579:28865): avc: denied { map } for pid=15567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.239185] kauditd_printk_skb: 120 callbacks suppressed [ 3098.239195] audit: type=1400 audit(1536420502.509:28986): avc: denied { map } for pid=15574 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.340137] audit: type=1400 audit(1536420502.569:28987): avc: denied { map } for pid=15574 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.410122] audit: type=1400 audit(1536420502.569:28988): avc: denied { map } for pid=15574 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.480106] audit: type=1400 audit(1536420502.569:28989): avc: denied { map } for pid=15574 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.530092] audit: type=1400 audit(1536420502.589:28990): avc: denied { map } for pid=15574 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.580099] audit: type=1400 audit(1536420502.589:28991): avc: denied { map } for pid=15574 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.630116] audit: type=1400 audit(1536420502.629:28992): avc: denied { map } for pid=15574 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.680100] audit: type=1400 audit(1536420502.629:28993): avc: denied { map } for pid=15574 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.730122] audit: type=1400 audit(1536420502.629:28994): avc: denied { map } for pid=15574 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.780087] audit: type=1400 audit(1536420502.719:28995): avc: denied { map } for pid=15574 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:28:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x622000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='yeah\x00') r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x90000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x80, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 3106.838656] kauditd_printk_skb: 21 callbacks suppressed [ 3106.838665] audit: type=1400 audit(1536420511.109:29017): avc: denied { map } for pid=15579 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3106.890087] audit: type=1400 audit(1536420511.129:29018): avc: denied { map } for pid=15579 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3106.940088] audit: type=1400 audit(1536420511.129:29019): avc: denied { map } for pid=15579 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3107.000125] audit: type=1400 audit(1536420511.129:29020): avc: denied { map } for pid=15579 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3107.060128] audit: type=1400 audit(1536420511.149:29021): avc: denied { map } for pid=15579 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3107.140088] audit: type=1400 audit(1536420511.149:29022): avc: denied { map } for pid=15579 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3107.230116] audit: type=1400 audit(1536420511.149:29023): avc: denied { map } for pid=15579 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3107.230141] audit: type=1400 audit(1536420511.169:29024): avc: denied { map } for pid=15579 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3107.230163] audit: type=1400 audit(1536420511.169:29025): avc: denied { map } for pid=15579 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3107.230187] audit: type=1400 audit(1536420511.259:29026): avc: denied { map } for pid=15579 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:28:31 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d0252806285717070") pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000001580)=[{&(0x7f0000000140)="a002", 0x2}], 0x1) 15:28:32 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000640)) 15:28:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) 15:28:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x37, 0x0) fsync(r0) 15:28:37 executing program 4: clock_nanosleep(0x4, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000001c0)={{0x0, @multicast2, 0x0, 0x0, 'dh\x00'}, {@dev, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x44) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @loopback}, 0xc) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) close(0xffffffffffffffff) [ 3113.272547] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 3113.412816] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 15:28:42 executing program 7: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) setsockopt$inet_group_source_req(r1, 0x0, 0x0, &(0x7f0000000300)={0xc37, {{0x2, 0x4e20}}, {{0x2, 0x4e23}}}, 0x108) 15:28:42 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$setown(r0, 0x8, r1) 15:28:42 executing program 5: syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x101400) 15:28:42 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$notify(r0, 0x402, 0x0) [ 3114.731925] kauditd_printk_skb: 120 callbacks suppressed [ 3114.731935] audit: type=1400 audit(1536420519.009:29147): avc: denied { map } for pid=15611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.733633] audit: type=1400 audit(1536420519.009:29148): avc: denied { map } for pid=15611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.737419] audit: type=1400 audit(1536420519.009:29149): avc: denied { map } for pid=15611 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.739240] audit: type=1400 audit(1536420519.009:29150): avc: denied { map } for pid=15611 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.746549] audit: type=1400 audit(1536420519.019:29151): avc: denied { map } for pid=15611 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.772359] audit: type=1400 audit(1536420519.049:29152): avc: denied { map } for pid=15611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.774261] audit: type=1400 audit(1536420519.049:29153): avc: denied { map } for pid=15611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.780816] audit: type=1400 audit(1536420519.059:29154): avc: denied { map } for pid=15611 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.782389] audit: type=1400 audit(1536420519.059:29155): avc: denied { map } for pid=15611 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.789748] audit: type=1400 audit(1536420519.059:29156): avc: denied { map } for pid=15611 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.346693] kauditd_printk_skb: 12 callbacks suppressed [ 3125.346702] audit: type=1400 audit(1536420529.619:29169): avc: denied { map } for pid=15623 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.348255] audit: type=1400 audit(1536420529.619:29170): avc: denied { map } for pid=15623 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.361923] audit: type=1400 audit(1536420529.639:29171): avc: denied { map } for pid=15623 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.363566] audit: type=1400 audit(1536420529.639:29172): avc: denied { map } for pid=15623 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.380245] audit: type=1400 audit(1536420529.659:29173): avc: denied { map } for pid=15623 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.384828] audit: type=1400 audit(1536420529.659:29174): avc: denied { map } for pid=15623 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.386386] audit: type=1400 audit(1536420529.659:29175): avc: denied { map } for pid=15623 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.392440] audit: type=1400 audit(1536420529.669:29176): avc: denied { map } for pid=15623 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.401596] audit: type=1400 audit(1536420529.679:29177): avc: denied { map } for pid=15623 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.409050] audit: type=1400 audit(1536420529.679:29178): avc: denied { map } for pid=15623 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.954870] kauditd_printk_skb: 1 callbacks suppressed [ 3139.954879] audit: type=1400 audit(1536420544.229:29180): avc: denied { map } for pid=15637 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.956426] audit: type=1400 audit(1536420544.229:29181): avc: denied { map } for pid=15637 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.959786] audit: type=1400 audit(1536420544.229:29182): avc: denied { map } for pid=15637 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.991567] audit: type=1400 audit(1536420544.269:29183): avc: denied { map } for pid=15637 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.997987] audit: type=1400 audit(1536420544.269:29184): avc: denied { map } for pid=15637 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.023332] audit: type=1400 audit(1536420544.299:29185): avc: denied { map } for pid=15637 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.025253] audit: type=1400 audit(1536420544.299:29186): avc: denied { map } for pid=15637 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.031899] audit: type=1400 audit(1536420544.309:29187): avc: denied { map } for pid=15637 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.041924] audit: type=1400 audit(1536420544.319:29188): avc: denied { map } for pid=15637 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.060783] audit: type=1400 audit(1536420544.339:29189): avc: denied { map } for pid=15637 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.320069] kauditd_printk_skb: 1 callbacks suppressed [ 3148.320078] audit: type=1400 audit(1536420552.589:29191): avc: denied { map } for pid=15638 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.341864] audit: type=1400 audit(1536420552.619:29192): avc: denied { map } for pid=15638 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.345536] audit: type=1400 audit(1536420552.619:29193): avc: denied { map } for pid=15638 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.351712] audit: type=1400 audit(1536420552.629:29194): avc: denied { map } for pid=15638 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.366548] audit: type=1400 audit(1536420552.639:29195): avc: denied { map } for pid=15638 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.384903] audit: type=1400 audit(1536420552.659:29196): avc: denied { map } for pid=15638 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.391649] audit: type=1400 audit(1536420552.669:29197): avc: denied { map } for pid=15638 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.406143] audit: type=1400 audit(1536420552.679:29198): avc: denied { map } for pid=15638 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.421672] audit: type=1400 audit(1536420552.699:29199): avc: denied { map } for pid=15638 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.429287] audit: type=1400 audit(1536420552.699:29200): avc: denied { map } for pid=15638 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3295.190097] INFO: task init:1 blocked for more than 140 seconds. [ 3295.190105] Not tainted 4.14.68+ #4 [ 3295.190108] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3295.190112] init D24664 1 0 0x00000004 [ 3295.190130] Call Trace: [ 3295.190161] ? __schedule+0x729/0x1ed0 [ 3295.190181] ? __sched_text_start+0x8/0x8 [ 3295.190193] ? perf_trace_lock+0x11a/0x4c0 [ 3295.190200] ? __lock_acquire+0x619/0x4320 [ 3295.190213] ? __down+0x120/0x2a0 [ 3295.190221] schedule+0x7f/0x1b0 [ 3295.190231] schedule_timeout+0x710/0xe60 [ 3295.190246] ? usleep_range+0x130/0x130 [ 3295.190264] ? __down+0x178/0x2a0 [ 3295.190277] ? mark_held_locks+0xc2/0x130 [ 3295.190287] ? _raw_spin_unlock_irq+0x24/0x50 [ 3295.190296] ? __down+0x120/0x2a0 [ 3295.190305] ? __down+0x120/0x2a0 [ 3295.190313] __down+0x180/0x2a0 [ 3295.190325] ? ww_mutex_lock+0x50/0x50 [ 3295.190337] ? atomic_dec_and_mutex_lock+0x30/0x80 [ 3295.190359] down+0x58/0x70 [ 3295.190369] console_lock+0x24/0x70 [ 3295.190375] console_device+0x17/0xb0 [ 3295.190388] tty_lookup_driver+0x17a/0x210 [ 3295.190399] ? tty_init_dev+0x3a0/0x3a0 [ 3295.190405] tty_open+0x3b9/0x980 [ 3295.190420] ? tty_init_dev+0x3a0/0x3a0 [ 3295.190428] ? chrdev_open+0x7d/0x570 [ 3295.190438] ? refcount_inc_not_zero+0x6b/0xb0 [ 3295.190453] ? tty_init_dev+0x3a0/0x3a0 [ 3295.190460] chrdev_open+0x20d/0x570 [ 3295.190470] ? cdev_put.part.0+0x50/0x50 [ 3295.190494] do_dentry_open+0x426/0xda0 [ 3295.190501] ? cdev_put.part.0+0x50/0x50 [ 3295.190523] vfs_open+0x11c/0x210 [ 3295.190539] path_openat+0x4eb/0x23a0 [ 3295.190560] ? path_mountpoint+0x9a0/0x9a0 [ 3295.190570] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 3295.190580] ? check_preemption_disabled+0x34/0x160 [ 3295.190592] ? perf_trace_lock+0x11a/0x4c0 [ 3295.190598] ? check_preemption_disabled+0x34/0x160 [ 3295.190612] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 3295.190646] do_filp_open+0x197/0x270 [ 3295.190657] ? may_open_dev+0xd0/0xd0 [ 3295.190688] ? _raw_spin_unlock+0x29/0x40 [ 3295.190714] do_sys_open+0x2ef/0x580 [ 3295.190726] ? filp_open+0x60/0x60 [ 3295.190737] ? trace_hardirqs_on_caller+0x381/0x520 [ 3295.190745] ? _raw_spin_unlock_irq+0x35/0x50 [ 3295.190760] ? do_syscall_64+0x43/0x4b0 [ 3295.190768] ? do_sys_open+0x580/0x580 [ 3295.190778] do_syscall_64+0x19b/0x4b0 [ 3295.190796] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 3295.190802] RIP: 0033:0x7fe84da63120 [ 3295.190806] RSP: 002b:00007fff3f56a448 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 3295.190815] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fe84da63120 [ 3295.190819] RDX: 0000000000000000 RSI: 0000000000000901 RDI: 00000000004072c8 [ 3295.190823] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3295.190827] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000901 [ 3295.190832] R13: 0000000000000901 R14: 0000000000000032 R15: 0000000001566358 [ 3295.190870] INFO: task kworker/0:0:3 blocked for more than 140 seconds. [ 3295.190874] Not tainted 4.14.68+ #4 [ 3295.190877] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3295.190880] kworker/0:0 D27392 3 2 0x80000000 [ 3295.190907] Workqueue: ipv6_addrconf addrconf_verify_work [ 3295.190912] Call Trace: [ 3295.190926] ? __schedule+0x729/0x1ed0 [ 3295.190946] ? __sched_text_start+0x8/0x8 [ 3295.190955] ? lock_downgrade+0x560/0x560 [ 3295.190961] ? lock_acquire+0x10f/0x380 [ 3295.190969] ? __mutex_lock+0x1bc/0x1480 [ 3295.190984] schedule+0x7f/0x1b0 [ 3295.190994] schedule_preempt_disabled+0x13/0x20 [ 3295.191002] __mutex_lock+0x521/0x1480 [ 3295.191012] ? addrconf_verify_work+0xa/0x20 [ 3295.191030] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 3295.191063] ? lock_acquire+0x10f/0x380 [ 3295.191083] ? addrconf_verify_work+0xa/0x20 [ 3295.191089] addrconf_verify_work+0xa/0x20 [ 3295.191098] process_one_work+0x86e/0x15c0 [ 3295.191122] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 3295.191151] worker_thread+0xdc/0x1000 [ 3295.191178] ? process_one_work+0x15c0/0x15c0 [ 3295.191185] kthread+0x348/0x420 [ 3295.191193] ? kthread_create_on_node+0xe0/0xe0 [ 3295.191204] ret_from_fork+0x3a/0x50 [ 3295.192010] INFO: task syz-executor6:15619 blocked for more than 140 seconds. [ 3295.192014] Not tainted 4.14.68+ #4 [ 3295.192017] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3295.192020] syz-executor6 D28536 15619 12525 0x00000004 [ 3295.192037] Call Trace: [ 3295.192052] ? __schedule+0x729/0x1ed0 [ 3295.192072] ? __sched_text_start+0x8/0x8 [ 3295.192081] ? lock_downgrade+0x560/0x560 [ 3295.192087] ? lock_acquire+0x10f/0x380 [ 3295.192095] ? __mutex_lock+0x1bc/0x1480 [ 3295.192110] schedule+0x7f/0x1b0 [ 3295.192120] schedule_preempt_disabled+0x13/0x20 [ 3295.192128] __mutex_lock+0x521/0x1480 [ 3295.192140] ? raw_close+0xe/0x30 [ 3295.192158] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 3295.192171] ? __local_bh_enable_ip+0x65/0xb0 [ 3295.192182] ? __sock_release+0x250/0x250 [ 3295.192188] ? trace_hardirqs_on_caller+0x381/0x520 [ 3295.192196] ? qtaguid_untag+0x4e6/0x740 [ 3295.192202] ? __local_bh_enable_ip+0x65/0xb0 [ 3295.192210] ? qtaguid_untag+0x2fc/0x740 [ 3295.192223] ? qtudev_open+0xa40/0xa40 [ 3295.192230] ? lock_acquire+0x10f/0x380 [ 3295.192244] ? __sock_release+0x250/0x250 [ 3295.192251] ? raw_close+0xe/0x30 [ 3295.192256] raw_close+0xe/0x30 [ 3295.192265] inet_release+0xf7/0x1c0 [ 3295.192276] __sock_release+0xce/0x250 [ 3295.192288] sock_close+0x15/0x20 [ 3295.192295] __fput+0x25e/0x6f0 [ 3295.192315] task_work_run+0x116/0x190 [ 3295.192331] exit_to_usermode_loop+0x12e/0x150 [ 3295.192340] do_syscall_64+0x35d/0x4b0 [ 3295.192357] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 3295.192362] RIP: 0033:0x410c51 [ 3295.192366] RSP: 002b:00007ffc1e1bd380 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 3295.192373] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000410c51 [ 3295.192377] RDX: 0000000020000000 RSI: 00000000007301e8 RDI: 0000000000000003 [ 3295.192381] RBP: 0000000000000000 R08: ffffffffffffffff R09: ffffffffffffffff [ 3295.192385] R10: 00007ffc1e1bd2b0 R11: 0000000000000293 R12: 0000000000000000 [ 3295.192390] R13: 00000000002f6cf5 R14: 000000000000010c R15: badc0ffeebadface [ 3295.192424] [ 3295.192424] Showing all locks held in the system: [ 3295.192433] 1 lock held by init/1: [ 3295.192436] #0: (tty_mutex){+.+.}, at: [] tty_open+0x3a8/0x980 [ 3295.192457] 3 locks held by kworker/0:0/3: [ 3295.192459] #0: ("%s"("ipv6_addrconf")){+.+.}, at: [] process_one_work+0x787/0x15c0 [ 3295.192475] #1: ((addr_chk_work).work){+.+.}, at: [] process_one_work+0x7bf/0x15c0 [ 3295.192490] #2: (rtnl_mutex){+.+.}, at: [] addrconf_verify_work+0xa/0x20 [ 3295.192509] 1 lock held by khungtaskd/23: [ 3295.192511] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x74/0x20f [ 3295.192530] 1 lock held by rsyslogd/1626: [ 3295.192532] #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0xa2/0xc0 [ 3295.192551] 2 locks held by getty/1754: [ 3295.192553] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x20/0x80 [ 3295.192569] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1ff/0x15e0 [ 3295.192690] 4 locks held by kworker/u4:0/14235: [ 3295.192693] #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x787/0x15c0 [ 3295.192709] #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x7bf/0x15c0 [ 3295.192725] #2: (net_mutex){+.+.}, at: [] cleanup_net+0x14c/0x880 [ 3295.192741] #3: (rtnl_mutex){+.+.}, at: [] cleanup_net+0x151/0x880 [ 3295.192758] 2 locks held by syz-executor6/15619: [ 3295.192761] #0: (&sb->s_type->i_mutex_key#9){+.+.}, at: [] __sock_release+0x84/0x250 [ 3295.192778] #1: (rtnl_mutex){+.+.}, at: [] raw_close+0xe/0x30 [ 3295.192794] [ 3295.192796] ============================================= [ 3295.192796] [ 3295.192801] NMI backtrace for cpu 1 [ 3295.192807] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.68+ #4 [ 3295.192810] Call Trace: [ 3295.192819] dump_stack+0xb9/0x11b [ 3295.192834] ? irq_force_complete_move.cold.3+0x64/0x64 [ 3295.192849] nmi_cpu_backtrace.cold.0+0x47/0x85 [ 3295.192862] ? irq_force_complete_move.cold.3+0x64/0x64 [ 3295.192868] nmi_trigger_cpumask_backtrace+0x121/0x146 [ 3295.192882] watchdog+0x574/0xa70 [ 3295.192901] ? reset_hung_task_detector+0x10/0x10 [ 3295.192909] kthread+0x348/0x420 [ 3295.192916] ? kthread_create_on_node+0xe0/0xe0 [ 3295.192928] ret_from_fork+0x3a/0x50 [ 3295.192957] Sending NMI from CPU 1 to CPUs 0: [ 3295.193061] NMI backtrace for cpu 0 [ 3295.193065] CPU: 0 PID: 10818 Comm: syz-executor5 Not tainted 4.14.68+ #4 [ 3295.193069] task: ffff8801c9d8c680 task.stack: ffff8801c7c88000 [ 3295.193071] RIP: 0033:0x4023c7 [ 3295.193074] RSP: 002b:00007fa8c7567690 EFLAGS: 00000286 [ 3295.193080] RAX: 000000009e9102a3 RBX: 0000000000000007 RCX: 0000000000457099 [ 3295.193084] RDX: 0000000000000000 RSI: 00007fa8c75676c0 RDI: 0000000000000007 [ 3295.193087] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 3295.193091] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 3295.193094] R13: 00000000004d7008 R14: 00000000004ca112 R15: 0000000000000000 [ 3295.193098] FS: 00007fa8c7568700(0000) GS:ffff8801dba00000(0000) knlGS:0000000000000000 [ 3295.193101] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3295.193105] CR2: 00007ffef5372608 CR3: 00000001c91c4004 CR4: 00000000001606b0 [ 3295.193108] DR0: 0000000000000000 DR1: 0000000020000000 DR2: 0000000000000000 [ 3295.193112] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3295.193974] Kernel panic - not syncing: hung_task: blocked tasks [ 3295.193980] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.68+ #4 [ 3295.193982] Call Trace: [ 3295.193991] dump_stack+0xb9/0x11b [ 3295.194003] panic+0x1bf/0x3a4 [ 3295.194011] ? add_taint.cold.4+0x16/0x16 [ 3295.194025] ? printk_safe_flush+0xb6/0x110 [ 3295.194046] watchdog+0x585/0xa70 [ 3295.194065] ? reset_hung_task_detector+0x10/0x10 [ 3295.194073] kthread+0x348/0x420 [ 3295.194080] ? kthread_create_on_node+0xe0/0xe0 [ 3295.194091] ret_from_fork+0x3a/0x50 [ 3295.194373] Dumping ftrace buffer: [ 3295.194379] (ftrace buffer empty) [ 3295.194385] Kernel Offset: 0x1e600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)