fffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 17:04:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x68100, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0xfffffffffffffffe, 0x2, {0x1, 0x0, 0x5, 0x80000001}}, 0x20) r2 = semget$private(0x0, 0x0, 0x380) semctl$GETZCNT(r2, 0x2, 0xf, &(0x7f00000000c0)=""/173) 17:04:56 executing program 3: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000140)=""/57) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0x6, 0x2, 0x9}) 17:04:56 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r16 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r16, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r17 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r17, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 17:04:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0xeb4c20cfe82a5bbb) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000100)) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000040)={0x3f, 0x7fff, [0x8, 0x80, 0xff, 0xcb, 0x800], 0xfe}) 17:04:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) 17:04:56 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'boN\x00\x00\x00\x00\x00\x00\x00\n\x00\xc2\xeb\x00', 0x200}) 17:04:56 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 17:04:56 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r16 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r16, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) 17:04:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1) 17:04:56 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 17:04:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) 17:04:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x7, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") open_by_handle_at(r2, &(0x7f00000000c0)={0x55, 0x40, "f4fa2edb4e76454d8d04a3654ed06a620740e6745195c306f15e0da2bcdd965708753580fcd2969e12e0e7069515584b07c99010d41438debdb5484aee5921a093d170cce042727e7051149d47"}, 0x200000) 17:04:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000100)={'bridge_slave_0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xfffffffffffffff7, 0x4800) ioctl$SIOCRSSL2CALL(r3, 0x89e2, &(0x7f00000000c0)=@bcast) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r4, &(0x7f0000007e00), 0x4d2, 0x4008000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000000000), 0x4) 17:04:57 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 17:04:57 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r16 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r16, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 17:04:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev.qet/thz\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) times(&(0x7f0000000000)) 17:04:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) 17:04:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=r5, @ANYBLOB="0fdc35f16274c180bb9ef205af93d43d303915e56d5b954087194028cbcfbdbd6ba9a2"], &(0x7f0000000140)=0xe) r6 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$BINDER_THREAD_EXIT(r6, 0x40046208, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r2) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000005c0)={0x0, 0x100000001, 0x8, 0x0, 0xc300, 0x7f, 0x100000001, 0x80, 0x7, 0x401, 0x101, 0x10000, 0x0, 0x2, 0x81, 0x401, 0x8, 0x0, 0xfffffffffffffff8}) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f00000004c0)=""/130) sendmmsg(r8, &(0x7f0000007e00), 0x4d2, 0x4008000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev={0xfe, 0x80, [], 0xe}, @in6=@mcast2, 0x4e21, 0x3, 0x4e22, 0x0, 0x2, 0x80, 0x48e778b5d9766486, 0x3b, 0x0, r9}, {0x8, 0x7, 0xb1d8, 0x0, 0x1, 0xfff, 0xfffffffffffffffe, 0x92a}, {0x1ff, 0x4, 0x6, 0x5}, 0x0, 0x6e6bb2, 0x0, 0x3, 0x1, 0x1}, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0x4d5, 0x32}, 0x2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3506, 0x0, 0x3, 0x80, 0x91d, 0x0, 0x8001}}, 0xfffffffffffffcb4) ioctl$DRM_IOCTL_AGP_ENABLE(r6, 0x40086432, &(0x7f00000001c0)=0x8001) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:04:57 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) 17:04:57 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r16 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r16, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r17 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r17, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") inotify_init() 17:04:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 17:04:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write(r1, &(0x7f00000000c0)="20bf30b7ad2668b330db96766cf6d165a521676f65ee95898387eaaef283e74ad09e2f0516498c409a55dc32c9671656604327cb47ed7195c0a54cb026e3a9b9cc9803e191bd21405ebf781099a11950e11a408b3c65feeade9067275941575a750e6d4b9bd279fa0339e9027578c813c9e98ce10e7879eae8a0a6a8c1b2f70ad771e2d4908eca7f9cd00fdbf85ce422cbc4355658e080cafdd9b98427852a216e149146a56aa41eaadf3aea4f6268b792b7ef137d2020f9395253da09a1d2b12fca", 0xc2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:04:57 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 17:04:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 17:04:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='*n\b\x00', 0x208100, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='.dev/h\x00\x00\x00\x00\x01', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xdc10f841349a2d44, 0x0) 17:04:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clone(0x10000020800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:04:57 executing program 5: r0 = mq_open(&(0x7f0000000000)='veth1_to_team\x00', 0x800, 0x20, &(0x7f0000000040)={0x8, 0x80000001, 0xf3, 0x200, 0x8, 0xaa16, 0x2, 0x3ff}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x121080, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x840, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:04:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 17:04:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clone(0x10000020800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:04:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xe0002, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:04:57 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) 17:04:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 17:04:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200002, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:04:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clone(0x10000020800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:04:57 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x20) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r3, &(0x7f0000007e00), 0x4d2, 0x4008000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000000)="7d6f6b0c5b88d5bf26bc38ff9801a901", 0x10) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000080)=""/57) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0b82b84e7970") write$binfmt_misc(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="73797a3008a27d63a1dee7a73664db8277e089db5a212ca7600c054678ab593542b59930dda4ecf6ff4183c6087b170d3ab803e88982f29dec0af4644001e27fcde40b3b09cf0e88ca2b38d0dd941a4d004090dfb967e551e6e58361ce1b6d1ce94a38ce1b58d45b96736a25f339421316b03d3dc2a98b6dd404918e67fb03956efcfec71e955e5e0dc5619d4cdf8ded3a28544f0ea65387d50b4ccdff979ebb62776088eb8b92bed6b46a7adbe413560d2cb2510f5562e1c9020ae6c8524ad3311e8d08fabd2d1de455304a5b110522d821967868"], 0xd5) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)=0x7) ioctl$KVM_SET_FPU(r4, 0x41a0ae8d, &(0x7f00000000c0)={[], 0x100000001, 0x5, 0x0, 0x0, 0x4, 0x4000, 0x5800, [], 0x4}) 17:04:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:04:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, &(0x7f00000000c0)) 17:04:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clone(0x10000020800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 17:04:57 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) signalfd(r0, &(0x7f0000000540)={0x92f}, 0x8) 17:04:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000000)={0x227, 0x6}) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:04:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, &(0x7f00000000c0)) 17:04:57 executing program 2: clock_gettime(0x4, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0xfffffffffffffffe, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0)=0xe919, 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:04:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, &(0x7f00000000c0)) 17:04:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clone(0x10000020800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) 17:04:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") dup3(0xffffffffffffffff, r14, 0x0) 17:04:58 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00', 0x400}) [ 497.719577] kauditd_printk_skb: 140 callbacks suppressed [ 497.719584] audit: type=1400 audit(1568826298.210:3358): avc: denied { map } for pid=22818 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:04:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$rfkill(r1, &(0x7f0000000000)={0xffffffffffff9cb4, 0x9, 0x2, 0x1}, 0x8) 17:04:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clone(0x10000020800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:04:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), 0x0) 17:04:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 17:04:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc0001, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1\x00'}) 17:04:58 executing program 3: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000140)=""/57) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x5d, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000280)="5f3252130c5556dc6e240171e1c55dc738781ac66b1ce4f39e7b9b427eb951926f69391a642280b5220ea7bdd6a89e9320e87fe2200b7878df2dcfcd840eb704d5160a7ef23e26085a944f622d2832156673cc777279baa020ed58", &(0x7f0000000300)=""/41}, 0x20) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x20, r3, 0x301, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}]}, 0x20}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f00000000c0)=""/11, &(0x7f0000000100)=0xb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setresgid(0x0, r4, 0x0) mount$9p_xen(&(0x7f0000000000)='vmnet0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x10, &(0x7f0000000180)={'trans=xen,', {[{@loose='loose'}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r4}}, {@privport='privport'}], [{@pcr={'pcr', 0x3d, 0x21}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, '*vmnet0'}}]}}) 17:04:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), 0x0) 17:04:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) [ 498.331262] audit: type=1400 audit(1568826298.830:3359): avc: denied { map } for pid=22826 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:04:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) 17:04:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:04:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), 0x0) 17:04:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") [ 498.461582] audit: type=1400 audit(1568826298.880:3360): avc: denied { map } for pid=22836 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:04:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x44) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x1000, 0x4e00) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="794ec61b6e8455064d0b17dd473ce0d70a5c7f097ff2a0aead9c2499ad49155130b3bba2b0b29df762a9876d52a771d45959", @ANYRES16=r4, @ANYBLOB="010300000000000000000700fcff0b0002000800020000000000e7e77131562d2d28611e8978adcd481cc74d73b71b620b9cdbe1b60b481c0efeed2f5c82ef04856a21b3516cf768bf469616f7671f6438402518a3687cbbb261d59e5a28bc59bf7a43fd6cd2d7cf903ad985ea0fdd8ca518d86b8fec88f5af4f009c6aafb13c1239ca5fc68669fc"], 0x20}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1f, r6, 0x1, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r6, 0x800, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xfff}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x24000040) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040)=0x10000) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000a00)={0x23c, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_PROP={0x0, 0x2, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x20}}}}, @TIPC_NLA_BEARER_DOMAIN={0x0, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x0, 0x2, [@TIPC_NLA_PROP_MTU={0x0, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x6cd5}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0xefbb}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0xdb0}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0xfffffffffffffd10, 0x1, @in6={0xa, 0x4e24, 0xe42c, @loopback, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4ec3ea4b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x1}]}, @TIPC_NLA_LINK={0x108, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20002000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x0, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7131f73d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x434, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0xfffffffffffff240}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x68e8}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x9080}, 0x40) ioctl$int_out(r0, 0x5462, &(0x7f00000000c0)) 17:04:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x18, 0x0, 0x2, &(0x7f0000000340)) [ 498.550309] audit: type=1400 audit(1568826298.890:3361): avc: denied { create } for pid=22832 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 498.629726] audit: type=1400 audit(1568826298.900:3362): avc: denied { create } for pid=22832 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 17:04:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:04:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x800, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='syzkaller0\x00') setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x100, 0x7ff, 0x4b58, 0x7ff, 0x9, 0x3ff, 0x81}, 0x1c) 17:04:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) socket$inet_udplite(0x2, 0x2, 0x88) [ 498.724503] audit: type=1400 audit(1568826298.910:3363): avc: denied { map } for pid=22842 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:04:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) [ 498.799476] audit: type=1400 audit(1568826298.930:3364): avc: denied { map } for pid=22843 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:04:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x80000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x10200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x0, 0x8012, r1, 0x0) mremap(&(0x7f0000c13000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000a3b000/0x1000)=nil) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:04:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x18, 0x0, 0x2, &(0x7f0000000340)) 17:04:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fstat(r12, &(0x7f0000005700)) 17:04:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) dup2(r0, r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) [ 498.893984] audit: type=1400 audit(1568826298.940:3365): avc: denied { map } for pid=22848 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:04:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x9c, 0x4, &(0x7f0000000440)=[{&(0x7f00000000c0)="0b563466b43f3b9d4fbe03da63f48d2470d258ec401e810aff5100f9f4f11ec9bd2aa9a83f95b768bb6cf3374ae2146c05b148ed2b5955bb3eb2104de0b07bb17f11254c8180c251896dc38028df60078f637bb8edd8092dd207f35657ec8202faf03584376a84da0ef3af61f74ee1d5d69f78851841c97ae91ee5e500280fae", 0x80, 0x94a}, {&(0x7f0000000140)="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", 0xfa, 0xfffffffffffffff7}, {&(0x7f00000002c0)="d08a89a59dc99a9f0c7e54882aa6362028c13dbf68f77d19808f7974d84edd97c9d2ae711f70481341d4b85c45dc9b7efd5de777779411da9c212510b24ea2c8f38e8458eff7c6fa00ac87cf3b60e11f93d222ad1f39736cca5ed620e269cc44c6cb3064fb7fdd330f73de59b860e11edda0c0f66702bd5eaaa6dfc233c8ed13b60d6067f3953ba1948e7c780378d072cb882a3eae6e906436ff1672ab34768ac37b3979447460ee8e26cc25a8bf6316bde0613c0e3e67e4a5", 0xb9, 0x20}, {&(0x7f0000000380)="e4a83e3d3d67443f360568dfd0b5b1fb7b75f0b31d1a079a63a97ed5b7b0d2a6e96892bcfe4071b627a648a1ce593da8bd697ea9969ae6bc65c872ec0ca1f3953b6278fdb8f7a076a9557436a8d5694c3c09b6c3161b20cfd0ddf5ee275e0088c9cd22e4af6af289bc4c7ccca534844bd4a86154f5807ec6aec64ff53e93ccdf33bd17ef192a1c669b0f2f9734a2f0023d84c95d49c5c8fa91dbcae34be415c03616e6c6a2b8c4e17c45a387b46051fe19bc44", 0xb3, 0xe4d}], 0x400800, &(0x7f0000000240)='veth1_to_team\x00') 17:04:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000, 0x7, @rand_addr="00ff0f8a5207fc00000000000800", 0x3}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:04:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") [ 498.992740] audit: type=1400 audit(1568826298.950:3366): avc: denied { create } for pid=22832 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 499.049393] NFS: bad mount option value specified: veth1_to_team 17:04:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x18, 0x0, 0x2, &(0x7f0000000340)) 17:04:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) [ 499.083250] audit: type=1400 audit(1568826298.960:3367): avc: denied { create } for pid=22832 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 17:04:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 499.157578] NFS: bad mount option value specified: veth1_to_team 17:04:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x28044) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'yam0\x00', 0x1}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:04:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:04:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:04:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) 17:04:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:04:59 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:04:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 17:04:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) 17:05:00 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:05:00 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:05:00 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) 17:05:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) socket$nl_route(0x10, 0x3, 0x0) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) write$UHID_INPUT(r1, &(0x7f00000002c0)={0x8, "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", 0x1000}, 0x1006) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000001300)="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") 17:05:00 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:05:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:00 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:05:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x4e23, 0x5, @loopback}, 0x1c) listen(r1, 0x4bc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000000c0)={0x5, 0x1, 0x4, 0x400000, {0x77359400}, {0x4, 0x0, 0x0, 0x1, 0x0, 0x0, "aa34b7bd"}, 0x4, 0x2, @fd, 0x4}) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000100000044}, 0x98) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:00 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r9, 0x0, 0x0) 17:05:00 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgget(0x1, 0xdd6cfc1cb0fc4bc9) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000001c0)=""/57) 17:05:00 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x9, 0xcd) 17:05:00 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) 17:05:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x9, 0xcd) 17:05:01 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) ptrace$cont(0x18, r9, 0x0, 0x0) 17:05:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x9, 0xcd) 17:05:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x9, 0xcd) 17:05:01 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x200000000038) 17:05:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, 0x0, 0x0) 17:05:01 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) 17:05:01 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000100)=0x9) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x80) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x30000015}) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r3, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca", 0xfffffffffffffffe}, 0x60) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000000)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:01 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) gettid() 17:05:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x410c00, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000000)={0xffffffffffffff99, 0x0, 0x10001, 0x1ff}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000040)={0x3, r5}) 17:05:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, 0x0, 0x0) 17:05:01 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) mkdir(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000040)) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) renameat2(r1, &(0x7f0000000440)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00', 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x0, 0x4, 0x2, 0x5}, {0x1, 0x10000, 0x8, 0x6}, {0x40, 0x1, 0x6, 0x3}, {0xd6, 0xffff, 0x79, 0x2}]}, 0x10) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000140)=""/57) 17:05:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$selinux_context(r1, &(0x7f0000000200)='system_u:object_r:su_exec_t:s0\x00', 0x1f) open_by_handle_at(r4, &(0x7f00000001c0)={0x40, 0x7, "2ba82f8d276a6366e4e130b4ddd7a9f78293a9f9a26b69bc3208fae9504fd56720b85c0b204ab46687053f6b14c50f9335e6e23f07664a21"}, 0x10800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r5, 0x80000000}, &(0x7f0000000100)=0x8) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) write(r7, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) r8 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) fcntl$setflags(r8, 0x2, 0xca4608cba74cc138) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) recvmmsg(r7, &(0x7f0000006cc0)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, 0x0, 0x0) 17:05:01 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) 17:05:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0), 0xcd) 17:05:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) 17:05:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0), 0xcd) 17:05:02 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/bnep\x00') getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x192) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000140)=""/57) 17:05:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0), 0xcd) 17:05:02 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000400"/128], @ANYBLOB='\x00'/72], 0xb8) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x17, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x1}}, 0x18) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r3, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000500)=0x8) r4 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x3, 0x2) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) ptrace$cont(0x18, r8, 0x0, 0x0) 17:05:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x200000000038) 17:05:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/\x00\x00\xff\xff\xff\xff\x00', 0x1c9000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x9, &(0x7f0000000640)=[{&(0x7f00000000c0)="6af36e30b707a1f0b1b5522be08091649037c8c47d464c68fd2523267b4fa5d4b5936d1deddaa7b5250db0699181356f3f43", 0x32, 0xffffffff}, {&(0x7f0000000100)="9de3e985d9dedc7bfc7a7ff39d3153e383e5972c83c0badcf50514f44f16e52329b2", 0x22, 0x2}, {&(0x7f0000000140)="b33efb027ab5aec50e496155be05255ffe8f3b157c012a3bc2f2896eff1ee1f82ced10f14c512990caf1447c3fd3a4b43d291c0c5f3c518cdba21e914dacfd39a0ae647378926b872225d51b5e366704889ddc4d32e355bd9d83b8277fabc1739b1480a0d4f30fe4d29d410555dc8cd19d", 0x71, 0x1}, {&(0x7f00000002c0)="0d7f77523e3d4fb3872879032be6fa36b169baa91c642b29a1605795e9d418b7971421f2685dad7ba52fb702f283c1291fd234a3e61d154960abb24c8c907d949a141f0cf265e727e514448c2ae14ce5a3432d98289d12727019f60f8172d65f5607e1f859a27247d8551bb26137d3b427aa96c377b53c0f51510ab638eaa6a8b5a8a0a3f6c82cdd5039082cc53863c5e12f02849dcf8e264114352b237c98a80da29e63eac72e57cb237250d861acb0330c00ecba3abe1923d41d9e19b6b48f75ac22f959177d9b", 0xc8, 0x6}, {&(0x7f00000001c0)="0dbee49d07e29c816459590a6f94c247d10e2865412f2445fb396f801b54992e77b44a29cda5024816e983cdf0c33ce808490885f8b9b909003f9869599c22f236b50bd301b2d2e80c3f57a19fceb8092bbbcd7638a6b7f83f63f443a4d9ea6f6cd16be8e5728eeb695fcd675ed67b678710fbe21506d34acf2ae871f3f9f84417086bda220d45d14c2236a9a45464b71d60cff546734b9eb5bd48887f4806de059b7b0474", 0xa5, 0x7f}, {&(0x7f00000003c0)="4c628bf6addd00b7e6e5f317f242bc6c8b158628470c31dbbe8ca9249ca20652e85fdf148603b7170bec7b01e8ca5b39d4e62a294312dea709659b555e53f9ebfbfe9099b9e6dec93636389917724ef2fc399927a22fe3b3360c82b02a20e8fbd1f358bcd986a93c440e35a2555b84254287561b707e23465483448a7584fd1c7fd5f0693db828ec86fa7403fa751941eccdb2fa8e84c5cb5e6d46295ba4c895eeaecdd9d39d21aeaf0b89baa3ca19323a", 0xb1, 0x10}, {&(0x7f0000000480)="80dc404176872fa80cef899268913302877de06d3c52e5603924510038f292a4e7f507a70663fbc052977fbd19605df958749c39d58b4f9a68871a7811ab9f753f1515de725461bd751abd6d6cd1015c8d0f28f6a5677276825e2b51c41ecc2f469fc93ece4ce920b09b4854ff96c2e672be6829cde79ece0322421f2c55297d5d95f7f84bcd10333c310b3b6b8019513df17011b430bfb0263a2f7c5e940545888aa3ceab3998a5ef42c84525abdf135cbcb857e6215e97d587be", 0xbb, 0x6}, {&(0x7f0000000540)="d8817f01bdea95f8bad468eb75ac4f67fdc55d5ec92f09fd6a297363aa9f1e4921988fd0f67c425f1c87dedc48faa417fb7052933bfc6cb276db7fbd301364e2c4135edb790c4e54b7", 0x49, 0xdb}, {&(0x7f00000005c0)="960fb5a65c561957386ad949eb0b4bd130793aeea942aa4abaf1fb93e4805e6044285532755d6a8170eb496938af153b088d957b5536fd521fc9a3ded83459b9b85dc4cd8fe103a2dffbbd6abc5a7686cc20cefa877d4141579768", 0x5b, 0x5173f59b}], 0x40, &(0x7f00000007c0)={[{@fat=@check_normal='check=normal'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100000001}}, {@fat=@errors_continue='errors=continue'}, {@fat=@check_normal='check=normal'}, {@nodots='nodots'}, {@fat=@tz_utc='tz=UTC'}, {@nodots='nodots'}], [{@subj_type={'subj_type'}}, {@appraise='appraise'}, {@euid_gt={'euid>', r1}}, {@seclabel='seclabel'}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type', 0x3d, '/\x00\x00\xff\xff\xff\xff\x00'}}]}) 17:05:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000000)={0x10001, 0x6, 0x3}) 17:05:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) 17:05:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) 17:05:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'veth1\x11to_team\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) recvfrom$netrom(r1, &(0x7f0000000080)=""/138, 0x8a, 0x40000000, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 17:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() gettid() 17:05:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='&dH\x00', 0x200, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:03 executing program 3: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000140)=""/57) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffffffff7fffffff, 0x200000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$tun(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="000060060103090006000900080000aaf692b8350015229392518642bb946cc7bccd9e3cfb81240ab9e46c8596f6b2610636d5d7dbdd8175a65eb7bfed2369579687885638e4de4cbac592523b095ebf6a445be61a98d281194917e97ac044dbbf42207a72b3fd92daf0414142c0"], 0x35) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000080)=0xc04e, 0x8) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x2d72, 0x1000, 0x5}, 0xc) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r7, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={r7, @in={{0x2, 0x4e22, @rand_addr=0x4}}, 0x3, 0x10001, 0xffffffffffff0001}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000100)={r8, 0x101}, &(0x7f00000002c0)=0x8) 17:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 502.898694] kauditd_printk_skb: 78 callbacks suppressed [ 502.898701] audit: type=1400 audit(1568826303.390:3446): avc: denied { map } for pid=23116 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:03 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mountinfo\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}], 0x1, 0x600) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x65896ccc07111061) 17:05:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 502.995196] audit: type=1400 audit(1568826303.440:3447): avc: denied { map } for pid=23121 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getpid() [ 503.045964] audit: type=1400 audit(1568826303.530:3448): avc: denied { map } for pid=23134 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) 17:05:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x20, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xff}}, 0x24) [ 503.149029] audit: type=1400 audit(1568826303.640:3449): avc: denied { map } for pid=23145 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 503.178526] audit: type=1400 audit(1568826303.670:3450): avc: denied { map } for pid=23150 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 503.233820] audit: type=1400 audit(1568826303.730:3451): avc: denied { map } for pid=23155 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 503.624989] vivid-000: kernel_thread() failed [ 503.629773] vivid-001: kernel_thread() failed [ 503.666086] audit: type=1400 audit(1568826304.160:3452): avc: denied { map } for pid=23158 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 503.700161] audit: type=1400 audit(1568826304.170:3453): avc: denied { map } for pid=23159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) 17:05:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semget$private(0x0, 0x4, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:04 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 17:05:04 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r6) 17:05:04 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) pipe2(&(0x7f0000000040), 0x800) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'veth1_\xf7n_teaw\x00', 0x600}) 17:05:04 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x55fe35b31390f815, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f00000000c0)={0x800, 0x5c6, 0xffffffff, {0x0, 0x1c9c380}, 0x18a, 0x6}) ustat(0x81, &(0x7f0000000040)) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/57) 17:05:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) write$tun(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xc5) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_dccp_buf(r2, 0x21, 0x83, &(0x7f0000000100)="4929914c608cde70dab602271482a1a769573e8c4161d8fd739d85c02808e0aef30caf1c1bc1326f0eff64ef112156900f3e1fbbfeaf2b2b8dc8245b27630907e75caac3aa955ec2277fc0828c4a5cfd6702eaabecf9d1d480d9dc323f89976727b617903a1aac163c2bc638dc79fac665538f149e8983c3b2f08de858f2aa39da8ae4c5a928ddff8b3cb6e57f09628a1b19ba452c3564d7b9ea3c115f2c16974a3859da1200ffdec696fe21f0cc770ea40b", 0xb2) [ 503.825526] audit: type=1400 audit(1568826304.320:3454): avc: denied { map } for pid=23164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:04 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) getpgrp(0x0) [ 503.926304] audit: type=1400 audit(1568826304.370:3455): avc: denied { attach_queue } for pid=23162 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tun_socket permissive=0 17:05:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1329c537739cb41) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/\x00et/tun\x00', 0x10000, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth0\x00', 0x200}) r2 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r3, 0x1000000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") readv(r4, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/126, 0x7e}, {&(0x7f0000000180)=""/190, 0xbe}, {&(0x7f00000002c0)=""/89, 0x59}, {&(0x7f0000000340)=""/160, 0xa0}, {&(0x7f0000000400)=""/152, 0x98}, {&(0x7f00000005c0)=""/224, 0xe0}, {&(0x7f0000000240)=""/32, 0x20}, {&(0x7f00000004c0)=""/135, 0x87}], 0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000000c0)={0x42}, 0x10) 17:05:04 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) 17:05:04 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:05 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) 17:05:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x84001, 0x0) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x0, 0x2, 0x5}, 0xad}}, 0x18) 17:05:05 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:05 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 17:05:05 executing program 3: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000140)=""/57) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0x1, &(0x7f0000000000)="0becd99af3627f09d97710aaf327681e86c7da3542664eaa65ef03e3fb3325df443ae13ca313f53cba6e0a3ebab53dbf9c2f3444d6e918393726415442140cf567c3edca674056fbcbb35a802ac06023a5fbe8de26fadb4dace82368ccecd2b8990417b1e04b35c747043b50939b78456a3ae8f515daf959dda263067f6b5193f97aa20bd422d961e70abc365b12a25b34acbbea76f74920802ba97e5f41f86d4f13381e94738977562e81ce704bf2a9b0669f217caf13bff83906f5f1fabc95c0b7b9cb6018c276de7a4f47c41ae5", &(0x7f0000000180)=""/242, 0x4}, 0x20) 17:05:05 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:05 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) 17:05:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x5, 0x50, 0x5, 0x3, 0xdb7a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:05 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) tkill(r1, 0x20000000014) 17:05:06 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/Ptun\x00', 0x40200, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'syz_tun\x00', 0x200}) r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000000)={0x2, 0x0, [0x354, 0x0, 0x3d37, 0x5, 0x0, 0x1, 0x8, 0x7]}) socket$rds(0x15, 0x5, 0x0) 17:05:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 17:05:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:06 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) dup(r0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x46) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 17:05:06 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 17:05:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:06 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/n-t/tun\x00', 0x6bdc39b6ff1f2c37, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'ip_vti0\x00', 0x600}) socket$bt_bnep(0x1f, 0x3, 0x4) 17:05:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00', 0x400}) 17:05:09 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) tkill(r1, 0x20000000014) 17:05:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) 17:05:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$setlease(r1, 0x400, 0x37af14a8ca6e8575) 17:05:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dv/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x40) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000240)={'vethq_to_\xff\x0f\x00', 0x200}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$lock(r3, 0x25, &(0x7f0000000140)={0x1, 0x4, 0x100, 0x41a2}) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0xfffffffffffffffc, 0x7, 0x1b37, 0x3, "09bdb8e20ee72f9c1019fa490d0204dd370516a797acfc9c9f2900"}, 0x60) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101400, 0x0) kcmp(r2, 0x0, 0x5, r0, r4) 17:05:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:09 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='/dev/net/tun\x00', 0xd) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) [ 508.644630] kauditd_printk_skb: 28 callbacks suppressed [ 508.644638] audit: type=1400 audit(1568826309.140:3484): avc: denied { map } for pid=23293 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 17:05:09 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00'}) 17:05:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 508.772539] audit: type=1400 audit(1568826309.210:3485): avc: denied { map } for pid=23302 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 508.894454] audit: type=1400 audit(1568826309.260:3486): avc: denied { map } for pid=23307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 508.924169] audit: type=1400 audit(1568826309.270:3487): avc: denied { map } for pid=23308 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 508.947859] audit: type=1400 audit(1568826309.270:3488): avc: denied { map } for pid=23309 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 508.970217] audit: type=1400 audit(1568826309.320:3489): avc: denied { map } for pid=23314 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 508.992377] audit: type=1400 audit(1568826309.350:3490): avc: denied { map } for pid=23319 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 509.014599] audit: type=1400 audit(1568826309.390:3491): avc: denied { map } for pid=23323 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 509.036703] audit: type=1400 audit(1568826309.390:3492): avc: denied { map } for pid=23324 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 509.058858] audit: type=1400 audit(1568826309.470:3493): avc: denied { map } for pid=23325 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) tkill(r1, 0x20000000014) 17:05:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:12 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x3, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x3, 0x1, [@remote]}) 17:05:12 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) socket$inet_udplite(0x2, 0x2, 0x88) 17:05:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000003c0)=0x4, 0x4) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sendfile(r3, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(r4, &(0x7f0000000240)=[{&(0x7f0000000100)=""/35, 0x23}, {&(0x7f0000000140)=""/194, 0xc2}, {&(0x7f00000002c0)=""/169, 0xa9}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0xc9a, 0xfffffd2e) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000380)=0x6c0c1) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:12 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept4$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @initdev}, &(0x7f0000000100)=0x10, 0x800) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 17:05:12 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:12 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) 17:05:12 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$usbmon(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon0\x00', 0x0, 0x0) 17:05:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:15 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='un\x00', 0x444500, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = dup3(r0, r1, 0x40000) sendmsg$can_bcm(r2, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x3, {0x77359400}, {}, {0x1, 0x741b, 0x800, 0x1f}, 0x1, @canfd={{0x1, 0x3, 0x40, 0x8}, 0x14, 0x6, 0x0, 0x0, "2a59311a63fe4b223d0bba6584e3da08c6335f524f331fe12492393b6339f2dc92e4096bd1dad0c7e3983c7831fb4c41479f9827ab276b359030eb1f8d3e9a12"}}, 0x80}, 0x1, 0x0, 0x0, 0x8040}, 0x690b2b813004492) 17:05:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x412403, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:15 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") accept4(r1, &(0x7f0000000000)=@tipc, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) read(r2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) [ 514.768370] kauditd_printk_skb: 10 callbacks suppressed [ 514.768378] audit: type=1400 audit(1568826315.260:3504): avc: denied { map } for pid=23376 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x105480, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000040)={0xd000, 0x4000, 0xa00000000, 0x1, 0x1}) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="f8979da1c20039c76233f3e3b1f75c6e0d3bdf06785775e259cfe386210d288989d3c6d249776d6039cb038c320afb4a6700cb7c62bd7356416a4355b6617b", 0x3f) 17:05:15 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() socket$inet_udplite(0x2, 0x2, 0x88) getpgrp(0x0) 17:05:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 514.899711] audit: type=1400 audit(1568826315.320:3505): avc: denied { map } for pid=23385 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.005623] audit: type=1400 audit(1568826315.370:3506): avc: denied { map } for pid=23387 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.057659] audit: type=1400 audit(1568826315.400:3507): avc: denied { map } for pid=23389 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.080544] audit: type=1400 audit(1568826315.400:3508): avc: denied { map } for pid=23388 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.102870] audit: type=1400 audit(1568826315.410:3509): avc: denied { map } for pid=23392 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.125489] audit: type=1400 audit(1568826315.480:3510): avc: denied { map } for pid=23404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.147641] audit: type=1400 audit(1568826315.510:3511): avc: denied { map } for pid=23405 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.169771] audit: type=1400 audit(1568826315.540:3512): avc: denied { map } for pid=23408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 515.191862] audit: type=1400 audit(1568826315.550:3513): avc: denied { map } for pid=23407 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:18 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x480000, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000040)={0x5e, 0x80}) 17:05:18 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() socket$inet_udplite(0x2, 0x2, 0x88) getpgrp(0x0) 17:05:18 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:18 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 17:05:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:18 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:18 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 17:05:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='/dev/admmidi#\x00') connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r2, &(0x7f0000007e00), 0x4d2, 0x4008000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100)=0x28f, 0x4) getsockopt$rose(r1, 0x104, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400c0) ioctl$KVM_CHECK_EXTENSION_VM(r3, 0xae03, 0x3f) 17:05:18 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() socket$inet_udplite(0x2, 0x2, 0x88) getpgrp(0x0) 17:05:18 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='\x02et/tun\x00\x00\x00\x00\x00\x1a', 0x80040, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x80380}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'veth1_to_team\x00', 0x400}) 17:05:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x1000)=nil) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x420001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x7, &(0x7f0000000240)=[{0x100000000, 0x39dd50a9, 0x100000001, 0x1f}, {0x80000001, 0x2, 0x200, 0xfff}, {0x8a7c, 0x100000001, 0x7fff, 0x9}, {0x5, 0x101, 0xffffffffffff887c}, {0x7, 0x6, 0x1, 0x7}, {0x1, 0x1f, 0xffffffffffffffff}, {0x10000, 0xffff, 0x7, 0x100000000}]}, 0x10) fchown(r0, r3, r4) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/95, 0x5f) 17:05:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:21 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x4, 0x3, 0x0, 0x1}}, 0x2e) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:21 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) [ 520.842028] kauditd_printk_skb: 10 callbacks suppressed [ 520.842036] audit: type=1400 audit(1568826321.340:3524): avc: denied { map } for pid=23456 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)=0x1) 17:05:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 520.980686] audit: type=1400 audit(1568826321.430:3525): avc: denied { map } for pid=23470 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.074958] audit: type=1400 audit(1568826321.450:3526): avc: denied { map } for pid=23466 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.106610] audit: type=1400 audit(1568826321.450:3527): avc: denied { map } for pid=23472 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.147458] audit: type=1400 audit(1568826321.460:3528): avc: denied { map } for pid=23471 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.170120] audit: type=1400 audit(1568826321.550:3529): avc: denied { map } for pid=23483 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.192250] audit: type=1400 audit(1568826321.570:3530): avc: denied { map } for pid=23485 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.214358] audit: type=1400 audit(1568826321.600:3531): avc: denied { map } for pid=23488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.236692] audit: type=1400 audit(1568826321.650:3532): avc: denied { map } for pid=23490 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 521.316815] audit: type=1400 audit(1568826321.810:3533): avc: denied { map } for pid=23492 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x20000000014) 17:05:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:24 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'vlan0\x00', 0x10}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r5 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, &(0x7f00000000c0)=0xf18001, 0x3) ioctl$VT_SETMODE(r5, 0x5602, &(0x7f0000000100)={0x0, 0x3fa, 0x7, 0x8, 0x8}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'yam0\x00', 0x400}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x3, 0x62, [], 0x2, &(0x7f0000000180)=[{}, {}], &(0x7f00000001c0)=""/98}, &(0x7f0000000240)=0x78) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'rose0\x00', 0x584785b7dac807a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x600}) 17:05:24 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) geteuid() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x80380}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000000)={0x7f}) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x7, 0x10601) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000100)) 17:05:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:24 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000180)='\x00(\x8c\xafs\xc5N\xdb\xf53\xb8\x05*\x18#\xe2?\xe5\x85\x1a=1jq\x8f8\xf6\x00\xd2}=w\xbd N\r\xdf.\xc0\xddG\xe7s\x89\xc0\xf3\xac\x9f\xc5\x87H\xe4\xd1\x9b\xef*\x97e\xa0\xe4h\xe8\n(f\x81\xb4\xb4\xd0\xd4C\xc38\xeeDj\b\xa9\xc5\xc1\xc1\xdd2i\x8adV\xd6\x8f\v\xd3\xed]=D\xc1\xa0%\xba\x0e-!>`Y\x0e\xf4\x96\x10\xed\xaf\x05\xa6\xa1.\x01\xb5\x13\xb3\x8c\xeb\x1b\xb5Po\xe0\x01C\xbb\x0e\xd2\xd2\xe9\x97\xdf 1\x88d\x1f\xb2\xe4oz\xc3\x04Or\xcc41\xbf\xca\xd4\x95\xf4\x12\x93\x14\x11a\xc2\x16\x0e\x1e\x0f\xce\xfe\x00\v\xbf\x86\x19\xa1@\x89%\x88\x17\xe8C/\x06\xb2\xe5?\xf8\x13\x04`\x1b/,\xef\xd8G^\x82\xd85\a\x95;v(H\x7f\x92\xf3\x8b\xc8\xbc\xd7\x93)\x049X\xa4)\xfb\xa8\\\xd7d\xe9\x15\xe0\xf1\xb8\xa9\x03\x0f\xac\v\xfat#\xda#{H\x89H\xa4\xecJf\xee\x1eg', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:24 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x22) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x20000000014) 17:05:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:25 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:25 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20e072f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'\x00', 0x200}) 17:05:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:25 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$UI_DEV_DESTROY(r1, 0x5502) write$binfmt_elf64(r2, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8001, 0x200000000000000, 0x20e, 0x7, 0x54af896, 0x2, 0x3e, 0x7fff, 0x35, 0x40, 0x2e1, 0xfffffffffffffff8, 0x0, 0x38, 0x1, 0x9, 0x8000, 0x400}, [{0x6474e551, 0x17, 0x40c20000000, 0x4, 0x8000, 0x10003f, 0x401, 0x6}, {0x6474e551, 0x202, 0x8, 0xffffffffffffffff, 0x6, 0x5e9, 0x81, 0x5}], "5f8bbde7e859bf94bed162c682a08b22a4240d081858a629b74dd04550fd0839185549b65a2bf4c2528fa35dd99b05a529ca341037dce3105fc6ade7d614933d01095eb23bb75437f35d2278bb051a95a8037715df97ac1b2240938ad08487c259773e04446606659859067f1cc04096943da206e7b34f16"}, 0x128) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r4, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) r5 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r5, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$SIOCRSSCAUSE(r5, 0x89e1, &(0x7f00000000c0)=0x2) r6 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r6, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b3a, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca", 0x2c}, 0x60) r7 = accept$nfc_llcp(r6, &(0x7f00000001c0), &(0x7f0000000240)=0x60) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x9, 0x200000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) fcntl$notify(r7, 0x402, 0x6) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'nlmon0\x00'}) 17:05:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000000)={0x3}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x20000000014) 17:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r1, 0x1000000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000100)={r0, 0x0, 0xffffffffffffff80, 0x3b, 0x2}) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf18001, 0xeefffdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x8, 0x5}, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x5, 0x2, 0x9}, &(0x7f0000000200)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x8}}, 0x10) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000000)) 17:05:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 17:05:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xbb5902ad2f10d047) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r2, &(0x7f0000007e00), 0x4d2, 0x4008000) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000180)) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000040)={0x3ff, 'syz1\x00'}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @broadcast}, &(0x7f0000000140)=0xc) 17:05:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x20000, 0x0) flock(r4, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x1, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x5, 0x5}, 0x0, 0x0, &(0x7f0000000300)={0x2, 0x5, 0x97, 0x20}, &(0x7f0000000340)=0x1000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x4}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r3, 0x10, &(0x7f00000004c0)={&(0x7f0000000200)=""/13, 0xd, r5}}, 0x10) write$cgroup_int(r2, &(0x7f0000000180)=0x8000, 0x12) 17:05:26 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)) [ 525.869446] kauditd_printk_skb: 25 callbacks suppressed [ 525.869454] audit: type=1400 audit(1568826326.360:3559): avc: denied { map } for pid=23611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 525.920664] audit: type=1400 audit(1568826326.400:3560): avc: denied { map } for pid=23619 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 525.942890] audit: type=1400 audit(1568826326.420:3561): avc: denied { map } for pid=23613 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'syzkaller0\x00', 0x200}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/d\x80v/nl\xd1\xaa\x00', 0x103821, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vcan0\x00', 0x10}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 17:05:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x14) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace(0x4206, r0) ptrace$setregs(0xd, r0, 0x4, &(0x7f0000000000)) ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000000)={0x0}) 17:05:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000000)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) 17:05:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) [ 526.476000] audit: type=1400 audit(1568826326.970:3562): avc: denied { map } for pid=23625 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca", 0xfffffffffffffffc}, 0x60) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r1, 0x0, 0xe, &(0x7f0000000000)='veth1_to_team\x00', 0xffffffffffffffff}, 0x30) sched_getaffinity(r2, 0x8, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) [ 526.551015] audit: type=1400 audit(1568826327.050:3563): avc: denied { map } for pid=23636 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 526.625275] audit: type=1400 audit(1568826327.100:3564): avc: denied { map } for pid=23640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 526.655012] audit: type=1400 audit(1568826327.110:3565): avc: denied { map } for pid=23648 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 526.691368] audit: type=1400 audit(1568826327.190:3566): avc: denied { map } for pid=23656 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 526.713683] audit: type=1400 audit(1568826327.190:3567): avc: denied { map } for pid=23655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 527.200370] audit: type=1400 audit(1568826327.700:3568): avc: denied { map } for pid=23657 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x204200, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e21, @multicast2}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x2, {0x2, 0x4e21, @multicast1}, 'ifb0\x00'}) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x2, 0x5, 0x1b37, 0x0, "b83b05dfe31ed64c397efa490d0204dd37000000005b496b054aa79bac9ef2fe4eaf20a9183d0a9d9f2981afafee9758297159c364ca0000000000009700"}, 0x60) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000)=0x3, 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) 17:05:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='0de0[\xcdet/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:27 executing program 4: getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x1, 0x0, 0x6}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 17:05:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) getpgrp(0x0) 17:05:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='\xb5\x06\x00\x00/nLt\x17\x00un\x00', 0x4000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000100)={0x0, @aes256, 0x1, "4e86425ad622d788"}) sendmmsg(r2, &(0x7f0000007e00), 0x4000000000001bd, 0x4008000) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r4, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f00000003c0)={0x4, &(0x7f0000000380)=[{}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="7465be61c7b4460d010180000000e1cbf00000a1942a8a001f6e"], &(0x7f0000000040)=0x1a) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x800, 0x401, 0x82423c293f2e09e0, 0x5, 0x10001, 0x6, 0x6, 0x823b, r5}, 0x20) r6 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r6, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) write$vnet(r6, &(0x7f0000000300)={0x1, {&(0x7f0000000180)=""/240, 0xf0, &(0x7f00000002c0)=""/7, 0x3, 0x2}}, 0x68) 17:05:27 executing program 2: r0 = socket$unix(0x1, 0x20000000000805, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x2) listen(r0, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@suiddir='suiddir'}]}) poll(&(0x7f00000007c0)=[{r0, 0xc200}], 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dewTF8t/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) getpgrp(0x0) [ 527.425104] ptrace attach of "/root/syz-executor.4"[23678] was attempted by "/root/syz-executor.4"[23682] 17:05:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) [ 527.475912] gfs2: not a GFS2 filesystem 17:05:28 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x20000000014) 17:05:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bond0\x00', @remote}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000300)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e23, @broadcast}, 0x202, 0x0, 0x0, 0x0, 0x80, &(0x7f00000002c0)='vcan0\x00', 0x6000000000, 0x5, 0x2}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="080026bd2f328e28df25010000000000000007410000004c0018000000ff73797a3000"/98], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x24004181) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) getpgrp(0x0) 17:05:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x2, 0x1000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000], 0x0, 0x80380}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="b9800000c00f3235004000000f303664262e66400f3a17d800260f1cb873000000b9800000c00f3235008000000f30c4e278f5f167652e2e0f01cac461c172d1093e670f01cf66ba4000ec360f01f8", 0x4f}], 0x1, 0x0, &(0x7f0000000180), 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x200002) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'irlan0\x00', 0x200}) fremovexattr(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000358a4eea571cef0ca313ba6bbbb715a18918"]) 17:05:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x336, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:05:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) getpgrp(0x0) 17:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) exit(0x0) 17:05:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) getpgrp(0x0) 17:05:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x8, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x3c}}, 0x0) 17:05:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, &(0x7f0000000080)) 17:05:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) getpgrp(0x0) 17:05:29 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x20400) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x3, 0xc2800) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/fscreate\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000000c0)={0x3ff}) get_mempolicy(&(0x7f0000000140), &(0x7f0000000100), 0x1, &(0x7f0000ffc000/0x1000)=nil, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="71e602001fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004700)=[{{0x0, 0xfffffffffffffe6f, &(0x7f0000001640)=[{&(0x7f0000000200)=""/149, 0x95}], 0x1}}], 0x1, 0x0, 0x0) 17:05:29 executing program 0: socket$kcm(0x2b, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) 17:05:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") getpgrp(0x0) 17:05:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 17:05:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r3, 0x4003}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) 17:05:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x2}) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x9, 0xfffffffffffffffe, 0x200, 0x7, 0x13, 0xffffffffffff0000, 0x23e, 0xb1, 0x80000, 0x8687}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$FUSE_OPEN(r1, &(0x7f0000000100)={0x20, 0x0, 0x2, {0x0, 0x2}}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) fcntl$getflags(r0, 0x3) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r4, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000080)=0x3, 0x4) 17:05:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) 17:05:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") getpgrp(0x0) 17:05:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:05:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) 17:05:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, 0x0, 0x0, &(0x7f0000000080)) 17:05:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:05:30 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") getpgrp(0x0) 17:05:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 17:05:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:05:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 17:05:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") getpgrp(0x0) 17:05:30 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'z\x00\x00@\xff\xf3\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x200}) 17:05:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:05:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 17:05:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x42000, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)) 17:05:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") getpgrp(0x0) 17:05:31 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000080)) 17:05:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") getpgrp(0x0) 17:05:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/\x00', 0x8000, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, 0x93}, 0xa) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$setflags(r2, 0x2, 0x0) 17:05:31 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000180)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000100)=r2) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000040)=r2) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x7fff, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") getpgrp(0x0) 17:05:31 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8fc, 0x4a0000) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'bpq0\x00', 0x400}) 17:05:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000080)) 17:05:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") write$sndseq(0xffffffffffffffff, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") getpgrp(0x0) 17:05:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") write$sndseq(0xffffffffffffffff, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) [ 530.892622] kauditd_printk_skb: 49 callbacks suppressed [ 530.892630] audit: type=1400 audit(1568826331.380:3618): avc: denied { map } for pid=23855 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 530.995235] audit: type=1400 audit(1568826331.390:3619): avc: denied { map } for pid=23857 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 531.036333] audit: type=1400 audit(1568826331.440:3620): avc: denied { map } for pid=23864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 531.059201] audit: type=1400 audit(1568826331.470:3621): avc: denied { map } for pid=23862 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 531.081332] audit: type=1400 audit(1568826331.470:3622): avc: denied { map } for pid=23866 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 531.103436] audit: type=1400 audit(1568826331.530:3623): avc: denied { map } for pid=23871 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 531.126144] audit: type=1400 audit(1568826331.530:3624): avc: denied { map } for pid=23870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 531.611844] audit: type=1400 audit(1568826332.110:3625): avc: denied { map } for pid=23872 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:34 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000080)) 17:05:34 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'v\x01\x80\x00\x00\x89\x00\x00\x00team\x00', 0x400}) 17:05:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") write$sndseq(0xffffffffffffffff, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") getpgrp(0x0) 17:05:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x102, 0x0) r4 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000200)={r5, &(0x7f0000000100)=""/196}) sendto(r4, &(0x7f0000000380)="e15fbf911b2ba859ac8f48070efba0191fbfc7b07238262ec5161054133dd4c3ac6057bcd1d38198dfa1805e86f16e2528ced0f4ab8753a430f8e0234e66146b8298ba7a89c67a3af2cc071b1d7c74ff04593df4058fc4d7f7d73419893dfbf63f05eddc9d30a41ee41749cf32646249b4bd57ebdd4a92cf2349bd13b073d1c0499a7dccdbc85dfb4822611a2eef5619262facc5076420e6634b65dfe3e8913981ce4e2b71c9b7d76b45e87b3a11c5aee00c82dc22be582da9fe48f164a4cb628db925b6fde5b453c7ba3fa9ffc5cf04dafb475620f85755791c1cfb811acf", 0xdf, 0x40, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000280)=@req={0x6, 0x8, 0x2}, 0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) r7 = getgid() write$FUSE_DIRENTPLUS(r3, &(0x7f0000000700)=ANY=[@ANYBLOB="b800000000000000080000000000000005000000000000000200000000000000070000000000000000010000000000003f0000000000000001000000000000000600000000000000ff0f00000000000000020000000000000200000000000000040000000000000006000000450000000100000000000000ff000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="00010000f9ffffff00000000200a00000002000000546465762f66756c6c0000000000000000000000000000078e000000000000"], 0xb8) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000640)={r5, &(0x7f0000000600)=""/35}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000000)={r5, 0x2}) 17:05:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, 0x0) 17:05:34 executing program 1: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) [ 533.828337] audit: type=1400 audit(1568826334.320:3626): avc: denied { map } for pid=23878 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:34 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x241400, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) [ 533.889470] audit: type=1400 audit(1568826334.370:3627): avc: denied { map } for pid=23885 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:34 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x9) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x400, 0x10000) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f00000000c0)={0x20, "26f20ba562dbc0ceec723cae4deed7536d95842eaa5e36884138252b637fda4ffbb8c60f0c6c703a7fbaf39d36d0e819d37aa248348ccb89bd36762eefed500f5f562d012e604e93d15f2cafa18b3aba599492b2828e52399581c0846f8b327c40ad1f224240683020813792e8463b13691064e96b7fcdc22411ef334ffe7c6e"}) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000180)={0x3, 0x81}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x0, 0x100000000000000}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) 17:05:37 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'team_slave_1\x00', 0xc00}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:37 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:37 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 17:05:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xd92d7315609339c1, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, 0x0) 17:05:37 executing program 5: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000100)={0x80000000, 0x81, "71401d2c4814b2ee0ed9858f3ef810d329c704434327a9b481e8a0eac61fbfd1c164ed528df8d7c6a34a0ca8256a6f13ec867c9ae6a576bde8abdd75223807e95b7421715e410277e388fa02b95e854b31fc73ec234d4fa2a09439129a78cf8cc19ad26883f375c9898be7d00ffa268e1f203e2f89bb1a33ed555101dd08602184"}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getpeername$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) [ 536.861130] kauditd_printk_skb: 7 callbacks suppressed [ 536.861137] audit: type=1400 audit(1568826337.360:3635): avc: denied { map } for pid=23914 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x100000580, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x20000000004e20, 0x0, @ipv4}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet6(r0, &(0x7f00000005c0)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000001cc0)=0x4, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x3bfde9d00c37b4f0}, 0x2000) sendmmsg(r0, &(0x7f00000000c0), 0x40000000000025b, 0x0) 17:05:37 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/d/4V\x89\a\x00', 0x610300, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) [ 536.915715] audit: type=1400 audit(1568826337.410:3636): avc: denied { map } for pid=23925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x40, 0x6}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0x10}}, 0x20) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) fcntl$setstatus(r3, 0x4, 0x2000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) [ 536.977727] audit: type=1400 audit(1568826337.470:3637): avc: denied { map } for pid=23931 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 537.044374] audit: type=1400 audit(1568826337.480:3638): avc: denied { map } for pid=23932 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:37 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) [ 537.074266] audit: type=1400 audit(1568826337.520:3639): avc: denied { map } for pid=23936 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 537.132756] audit: type=1400 audit(1568826337.630:3640): avc: denied { map } for pid=23941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 537.163301] audit: type=1400 audit(1568826337.650:3641): avc: denied { map } for pid=23943 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 537.205021] audit: type=1400 audit(1568826337.700:3642): avc: denied { map } for pid=23946 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 537.238993] audit: type=1400 audit(1568826337.730:3643): avc: denied { map } for pid=23947 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 537.677702] audit: type=1400 audit(1568826338.170:3644): avc: denied { map } for pid=23948 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:40 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:40 executing program 5: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) sched_setattr(r0, &(0x7f0000000000)={0x30, 0x1, 0x3, 0xaf, 0x2, 0xffffffffffffffff, 0x4, 0xc7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x6d7795a755e0547, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x4f20, 0x0, @rand_addr="a37d5c3e4a10531b00fc73004daf407c"}, 0xfffffffffffffea6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmmsg(r3, &(0x7f0000007e00), 0x4d2, 0x4008000) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x50b}, "c26f1b00358c64c8", "a2350ac91c815bb648b9b1504bd7aa0c", "3d2284d9", "ff18755224e57570"}, 0x28) 17:05:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x5, 0x2, 0x5}) 17:05:40 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8ac1}], 0x1, 0x0) 17:05:40 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:40 executing program 5: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xb, &(0x7f0000000100)=0xc45, 0x4) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000011000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="00000000000000000c001a0004d01ff3f405000000fba8a32a4c00160004000000f81e01ff95d794721beac4c7a175552ae36e13c00fb84a30d14034db974deac5a88dcbe1fe0143dcdb313b8154bb5049de30e97f308559a3036ced0b6583aa16efe03dfe6b49492ffbc3db7f28137c88c1170415129b90e47d79fef1dd9b1ba2"], 0x2c}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={r4, @multicast1, @local}, 0xc) 17:05:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:40 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000000)={0x2, 0x8, 0x1, 0x503c357c970fc834, 0x2}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0xef88) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:41 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:41 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r2, 0x0, 0x17, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@initdev, @in=@local}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:41 executing program 3: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0xa, 0x1000000000000001, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) 17:05:41 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, 0x5}, 0x20) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xd0f, 0x40) 17:05:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000002c0)={{0xa, 0x1, 0x7, 0x8001, '\x00', 0x200}, 0x0, [0x7, 0x6, 0x3ff, 0x9, 0x200000000000001, 0x2f, 0x4, 0x4e4, 0x0, 0x4, 0x6, 0x9, 0x0, 0x6, 0x7, 0x7ff, 0x4, 0xff, 0x8, 0x200, 0x2, 0x0, 0x1, 0x73, 0x90e, 0x35, 0x80, 0x2, 0x5, 0x8, 0x44, 0x0, 0x53ed, 0x100000000, 0x2, 0x5, 0x7, 0x9, 0x2, 0x4, 0x4, 0x7, 0x4, 0x401, 0x7, 0x4, 0x0, 0x3, 0xf8e6, 0x0, 0x5aa2, 0x7, 0x5, 0x10001, 0x1b, 0x3, 0x7ff, 0x8, 0x2, 0x9, 0x4, 0x5, 0x7ffffffc, 0x2, 0xd3, 0x8, 0x5ce6, 0x6, 0x7f, 0xffff, 0x2f23, 0x2, 0x101, 0x8aa8, 0x3, 0x1, 0x2, 0x3, 0x4, 0xa1f, 0x7, 0x6947e7a5, 0x5, 0x1, 0x5, 0x4, 0x7ac1, 0x2, 0x800, 0x800, 0x8, 0xffffffff, 0x1, 0x1ff0, 0x191e, 0x2, 0x3, 0x5, 0x6, 0x9, 0x9, 0x9, 0x9, 0x8, 0xf3eb, 0x7fff, 0xffffffffffffffe4, 0x622baa1f, 0x2b79, 0x20, 0x7, 0x2, 0x10001, 0x8880, 0x5, 0x3, 0x9, 0x5, 0xf, 0x3, 0x8, 0x101, 0x81, 0x4, 0x100000001, 0x3, 0x7ff, 0x40], {0x77359400}}) 17:05:41 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f00000000c0)={'ip6erspan0\x00', 0x100, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:41 executing program 3: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 17:05:41 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_\x00\b\x00', 0x400}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$setstatus(r2, 0x4, 0x19ecb1e15203c411) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) [ 540.948072] device lo entered promiscuous mode 17:05:42 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:42 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) getuid() r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setresgid(0x0, r3, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0, 0x0, 0x6, {{0x3, 0x2, 0x5, 0xfffffffffffffffb, 0x3, 0x9, {0x5, 0x1, 0x1, 0xffffffffffffffff, 0x200000444db1cd, 0xc04, 0x28e, 0xffffbffffffffffa, 0x7f, 0x9, 0xf, r2, r3, 0x401, 0x80f4}}}}, 0xa0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '/dev/radio#\x00'}, {0x20, '/dev/net/tun\x00'}], 0xa, "de8996bce77b39c1897bd95a0898a4f3a7217344c4671964823ab9e030e139691bbe63477578ef416ef60d8fd113cc4f40b3c376a44e0f2083895ae1f9f3a8eedab39cbd3a867edc4f95d92f5dd6f03450ab8c77f2bd80b94ccbcce71d6d331a2d3df9e3525d4182f268258899"}, 0x93) 17:05:42 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000080)='./file0\x00') mknod(&(0x7f0000000040)='./control\x00', 0x0, 0x0) 17:05:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x2e0, [0x20000740, 0x0, 0x0, 0x20000770, 0x200009f0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x358) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x7474c3, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:42 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000100)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0xc002, 0x0) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000040)=0x2) 17:05:42 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:42 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/\x98l\xce\xf7\x8f\xaf\n\xd4tun\x00', 0xe05831d3ebfa7ab5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'gre0\x00', 0x4}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000002c0)=0xe8) ioprio_set$uid(0x3, r3, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'nlmon0\x00', 0x584785b7dac807a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'ve\xf8\x00\x00\x00\x00\x00\x00\x0eO\xff\xff\x00', 0x400}) [ 541.905695] kauditd_printk_skb: 26 callbacks suppressed [ 541.905703] audit: type=1400 audit(1568826342.400:3671): avc: denied { map } for pid=24071 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 542.099826] audit: type=1400 audit(1568826342.590:3672): avc: denied { map } for pid=24072 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 542.390128] protocol 88fb is buggy, dev hsr_slave_0 [ 542.395279] protocol 88fb is buggy, dev hsr_slave_1 [ 542.400392] protocol 88fb is buggy, dev hsr_slave_0 [ 542.405422] protocol 88fb is buggy, dev hsr_slave_1 17:05:42 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:42 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 542.501234] audit: type=1400 audit(1568826343.000:3673): avc: denied { map } for pid=24079 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x54, 0x8003, 0x7f, {0x3, 0x2}, {0xfff, 0x6}, @rumble={0x1}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000740)=0x0, &(0x7f0000000780), &(0x7f00000007c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x8003, &(0x7f0000000580)=0x9, 0x7fffffff) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(r5, &(0x7f0000000ac0)=[{&(0x7f0000000980)=""/96, 0x60}, {&(0x7f0000000a00)=""/6, 0x6}, {&(0x7f0000000a40)=""/105, 0x69}], 0x3, 0x0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x8, &(0x7f0000000680)=[{&(0x7f0000000140)="c06f5e9d842bb5abc92314cf25ae9d32ff2a2c95f3409a748379457f1cdc245bace7b9251a66f0b5ad104372b575b9366616a06be724ce9edb8fbb6bde1fcbc37a72e6a9f7cc92fce4bf5e178200d19291a3c98a74a53d6835e9e35ac527af249724f254e3dc4e84c6a2dbe45a0c0b48b856cf1693b01e99bf01faad5872b3ded1abf5dc65f910dd4b320601495cb3c59de96eada572763997b4ff2b8a5c359ec219a1cc65164b65d559eba25c7867468f064edf37", 0xfff0}, {&(0x7f0000000200)="283d7ef238eabd878cc99648356134926044", 0x12, 0x80000}, {&(0x7f00000002c0)="ab737a354c17989f72ef810dd06181b59f95eff02bbfa5e303618ed8a847dd5add375f49f67f4b0446f9bbd7b72f386c84d78aa47e2ed7468c8f582d3cc26cb82461a1c3bc37be0850e7bc01b11e1aa7af1800c10c4e1c33eb47138d5943b07e443c2ed0208a76ede5f3a31d5d48c4bfe08b6c00e20dc1217f7437112cc4d38ae3f1240ff5c63f2b21933b1db42b05fb7c8cfba15b8538e7fd321836e1250bf14697cc3408ee43af5c", 0xa9, 0xffff}, {&(0x7f0000000380)="5cb5e24509ac3acb470ad3895345dbef322e1301ac237e8b1a7f8cff3e05dd89eac5dc948a455ed98130a10e65b966ad79b65afc2549f0db4eb26f976bfb74cb46f97f03c649f69d75dbc905cf06c39cd881ef9929742a14f47d5cf27cd6b5e6eb584eaaacc906b92f7787f64d19b0ebe30386bc6fe12a39d914f8d105887b733ac99e7303f3ed747dc3ec3981bf53de2c14fbde9ece50d30bc2e437f548980b375b9067c42927096e4c7187b2fc913e4bdaf4600aca0790b71ce2a0dbbd84d201aba22796ad", 0xc6}, {&(0x7f0000000240)="9152f239fa4337a177eaefd3d596587a7f530605f435a463712a4bbfd110feff797ef6d27b", 0x25}, {&(0x7f0000000480)="3d504716c19f56da3eea7da779167322cd311c4b5738f481c7940211cc26acb2f102a01c502a9b4d49b014d33eb42255a5f4323ca63ac66c448a0443aedc83ccd5137d5de98008895e1066086d0246ab644620b605ba76c6f352f2b7a51ba1925140c215ac51f5a3daca4c4cee121383a222cf69b66e6ae516e3abdf4a8b205afcdd9d42b3ef09d68560ff24b6713188b84c178f5c3bfa8c4df1dcf1f52bd8310450b5cfcaf5b412be743f62d56d627c800e72e1a0bb1340847229063719a8173eadf33c5191812f769999430e2c96686063c0fbb8f4e31cf82bed2cdca776064d50b1f8a968dd97b7291b", 0xeb, 0x6}, {&(0x7f0000000c80)="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"/338, 0x152, 0x8001}, {&(0x7f0000000640)="4257a96068c030828549", 0xa, 0x80}], 0x4000, &(0x7f0000000b40)=ANY=[@ANYBLOB="6e6f6465636f6d706f73652c63726561746f723dfa0a1fbb2c706172743d3078303030303030303030303030303030302c747970653ddfd9728b2c63726561746f723d8f2e1ef32c73657373696f6e3d3078303030303030303030303030300830312c747970653d32097b6e2c646f6e745f61707072616973652c6378743d756e636f6e66696e65645f752c63006e746578743d73797361646d5f752c7375626a5f747970653d2f6465762f6e65742f74756e002c657569643d00000000", @ANYRESDEC=r2, @ANYBLOB=',func=FILE_MMAP,dont_measure,smackfshat=/selinux/checkreqprot\x00,uid<', @ANYBLOB="60b44dad86090c016ef0f606", @ANYBLOB="2c7063723d303030303030303030303030571bf7080e93b7e7a926"]) 17:05:43 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:05:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:43 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r2 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$P9_RLINK(r2, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1a5ba71530cf14c900000000"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000000)={'team0\x00'}) 17:05:43 executing program 1: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 542.547015] audit: type=1400 audit(1568826343.040:3674): avc: denied { map } for pid=24081 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) [ 542.644672] audit: type=1400 audit(1568826343.140:3675): avc: denied { map } for pid=24095 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) [ 542.716631] hfsplus: unable to parse mount options 17:05:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) [ 542.747737] audit: type=1400 audit(1568826343.190:3676): avc: denied { map } for pid=24099 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x28a9c0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) [ 542.834438] audit: type=1400 audit(1568826343.200:3677): avc: denied { map } for pid=24100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:43 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 17:05:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = getpgrp(0x0) ptrace$getsig(0x4202, r1, 0x181c00000000004, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f0000000140)={0x0, @reserved}) prctl$PR_SET_PTRACER(0x59616d61, r1) getpgrp(r1) [ 542.913795] audit: type=1400 audit(1568826343.230:3678): avc: denied { map } for pid=24105 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 542.948960] audit: type=1400 audit(1568826343.250:3679): avc: denied { map } for pid=24106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 543.006752] audit: type=1400 audit(1568826343.300:3680): avc: denied { map } for pid=24109 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:43 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) [ 543.239597] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xf318304f36f0f7e9, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:44 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 17:05:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f0000000100)=""/191, 0xbf}, {&(0x7f00000002c0)=""/221, 0xdd}, {&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f0000000200)=""/82, 0x52}, {&(0x7f00000003c0)=""/133, 0x85}, {&(0x7f0000000480)=""/179, 0xb3}], 0x7, &(0x7f00000005c0)=""/172, 0xac}, 0x1}, {{&(0x7f0000000680)=@rc, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000700)=""/188, 0xbc}, {&(0x7f00000007c0)=""/23, 0x17}, {&(0x7f0000000800)=""/185, 0xb9}, {&(0x7f00000008c0)=""/104, 0x68}, {&(0x7f0000000940)=""/225, 0xe1}, {&(0x7f0000000a40)=""/89, 0x59}, {&(0x7f0000000ac0)=""/140, 0x8c}], 0x7, &(0x7f0000000c00)=""/102, 0x66}, 0x2c}, {{&(0x7f0000000c80)=@isdn, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/160, 0xa0}], 0x1, &(0x7f0000000e00)=""/248, 0xf8}, 0x7}, {{&(0x7f0000000f00)=@ipx, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f80)=""/18, 0x12}, {&(0x7f0000000fc0)=""/163, 0xa3}], 0x2, &(0x7f00000010c0)=""/190, 0xbe}, 0x8}, {{&(0x7f0000001180)=@sco, 0x80, &(0x7f0000001400)=[{&(0x7f0000001200)=""/30, 0x1e}, {&(0x7f0000001240)=""/22, 0x16}, {&(0x7f0000001280)=""/10, 0xa}, {&(0x7f00000012c0)=""/195, 0xc3}, {&(0x7f00000013c0)=""/60, 0x3c}], 0x5}, 0x1}, {{&(0x7f0000001480)=@ipx, 0x80, &(0x7f0000001800)=[{&(0x7f0000001500)=""/251, 0xfb}, {&(0x7f0000001600)=""/84, 0x54}, {&(0x7f0000001680)=""/117, 0x75}, {&(0x7f0000001700)=""/242, 0xf2}], 0x4, &(0x7f0000001840)=""/25, 0x19}, 0x14338000}, {{&(0x7f0000001880)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001900)}, {&(0x7f0000001940)=""/153, 0x99}, {&(0x7f0000001a00)=""/12, 0xc}, {&(0x7f0000001a40)=""/53, 0x35}, {&(0x7f0000001a80)=""/156, 0x9c}], 0x5, &(0x7f0000001bc0)=""/123, 0x7b}, 0x6}], 0x7, 0x2002, &(0x7f0000001e00)={0x0, 0x989680}) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r2, &(0x7f0000007e00), 0x4d2, 0x4008000) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001f40)={r5, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}}, [0x8001, 0x8, 0x0, 0x2, 0x6, 0x10001, 0x1, 0x3, 0x0, 0x6, 0x3, 0x80, 0xfffffffffffffffe, 0x4, 0x7fff]}, &(0x7f0000001900)=0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000001e40)={r5, 0x9}, &(0x7f0000001e80)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001ec0)={r6, 0x8000}, &(0x7f0000001f00)=0x8) 17:05:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 17:05:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r3, &(0x7f0000007e00), 0x4d2, 0x4008000) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)={r6, 0x80}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e21, 0x6, @rand_addr="293fd4e475e21057d7c98013edb4cee5", 0x7f}}, 0x5f62, 0x80000000, 0x8, 0x4, 0x8}, &(0x7f0000000180)=0x98) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x10000, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x100000001, 0x14880) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000180)="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") ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x6, "6ed8d1624786d10cd76d4246fab0425d780c9918cbba7a1472103bb71bbbc9ba", 0x800, 0x1892, 0x5d, 0x4, 0x2}) 17:05:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) [ 544.033444] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:44 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 17:05:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) getsockopt$inet6_dccp_int(r0, 0x21, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/de\xcc\xa4\xceF\x00\x00\x00\xa3\xb3\x00', 0x391143, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'veth1_to_team\x00', 0x200}) 17:05:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)={0x4}) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], 0x6, 0x8) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 17:05:44 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={r2, r3, r4}, 0xc) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x4, 0x1b37, 0x8000, "b8bd00000000ff9c1019fa490d0204dd37231ce8cb5bf2fe4eaf2001183d23ba2981afafee9758297159c364ca000000000000000000000200", 0x1}, 0x60) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @bcast, @netrom={'nr', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) prctl$PR_SET_KEEPCAPS(0x8, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x6d5c287655f8a67b, &(0x7f0000000000)={@loopback, @rand_addr, @multicast1}, &(0x7f0000000040)=0xc) [ 544.157275] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = dup(r0) accept$ax25(r1, &(0x7f0000000100)={{0x3, @bcast}, [@netrom, @bcast, @bcast, @remote, @rose, @netrom, @null, @netrom]}, &(0x7f0000000180)=0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/d\x04\x00\x00\a\x00\x00\x00ttn\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:44 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'nr0\x00', 0x400}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 17:05:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={0x0}}, 0x0) 17:05:45 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x4, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0xffffffffffffffae) ioctl$KDADDIO(r0, 0x4b34, 0x9) msgget$private(0x0, 0x630) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000100)=0x1f3) ioctl$KDENABIO(r0, 0x4b36) 17:05:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:45 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000006640)='/proc/self/net/pfkey\x00', 0x60040, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000066c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000067c0)={&(0x7f0000006680)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000006780)={&(0x7f0000006700)={0x64, r2, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xa6f}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x10000000000000]}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x2a}}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x89}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x4d}, 0x40000) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={0x0}}, 0x0) 17:05:45 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x216000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, r2, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8017bdcfeef1f1b5}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x14}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffff8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfb}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0xbc}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7ff, 0x8effff21b78dde9a) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f0000000040)={0xc006, 0x1000, 0x0, 0xb04}) 17:05:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ne\xbc\n\xb7\xf7n\x00', 0x208040, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={0x0}}, 0x0) [ 545.069703] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000000)) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f00000002c0)={0x0, 0x0, 0x2080}) 17:05:45 executing program 5: getrlimit(0x5, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x3, 0x45a2, 0xffffffff, 0x1}, {0xb5c, 0x9, 0x5, 0x6}, {0x1, 0xfffffffffffffe01, 0x9, 0xf43}, {0x0, 0x9, 0xff55, 0x8000}]}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'vedhp_toGteam\x00', 0x900}) 17:05:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:46 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '\x00'}, &(0x7f0000000100)='veth1_to_hsr\x00', 0xd, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x600}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1f, r3, 0x1, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r3, 0x21, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x240000000, @bearer=@l2={'eth', 0x3a, 'ip6gre0\x00'}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x8000) 17:05:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'v\x01th1_to_team\x00'}) 17:05:46 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x42000, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000040)=0x8) [ 545.904902] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) r2 = dup(0xffffffffffffffff) pause() setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x0, 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$setflags(r3, 0x2, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r4, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000040)) r5 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0], 0x1}) 17:05:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:05:46 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\f5\x00', 0x282a42, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x8f00, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'\x0f\x9c\xb4\x9d\x00', 0x200}) 17:05:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:47 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$sock_ifreq(r1, 0x8948, &(0x7f00000000c0)={'bcsh0\x00', @ifru_data=&(0x7f0000000040)="143a9dfbe4a880038025570d175465c946eb74c5e34cca4bc661fbeb2c86925d"}) 17:05:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:47 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:47 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:47 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:47 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 546.753603] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ndt/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x3, 0xa, [@link_local, @remote, @broadcast, @dev={[], 0x25}, @local, @empty, @local, @empty, @local, @random="2db40069c6e4"]}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x80, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) 17:05:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:47 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) [ 546.953050] kauditd_printk_skb: 71 callbacks suppressed [ 546.953058] audit: type=1400 audit(1568826347.450:3752): avc: denied { map } for pid=24345 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 547.001023] audit: type=1400 audit(1568826347.500:3753): avc: denied { map } for pid=24349 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 547.039615] audit: type=1400 audit(1568826347.530:3754): avc: denied { map } for pid=24351 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 547.081606] audit: type=1400 audit(1568826347.580:3755): avc: denied { map } for pid=24352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 547.104581] audit: type=1400 audit(1568826347.580:3756): avc: denied { map } for pid=24353 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:48 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000002c0)=""/4096) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x200000000038) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xd, &(0x7f0000000040)='/dev/net/tun\x00'}, 0x30) r4 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000380)={r5, 0x5b, "9d7232ebd252ef5335fec471f921fde799038df44292df2e6a37cff897b41f8a6c5a1a031596aec18f7f6ac11e1b9b7060a2dcfa5e76b63eb9c005711631fd3f033d6b093a2be581d8a8bfae1024bbc8f6f3e5080af9e5861068e1"}, &(0x7f0000000400)=0x63) ptrace$peek(0x1, r3, &(0x7f0000000100)) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 17:05:48 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:48 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) [ 547.587236] audit: type=1400 audit(1568826348.080:3757): avc: denied { map } for pid=24360 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='\xaf\x00w\xe8\x00\x007\xde\x00', 0x38040, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = socket$isdn_base(0x22, 0x3, 0x0) sendmsg(r1, &(0x7f0000000200)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f00000001c0)}, 0xe2f6edbc7bb94f02) 17:05:48 executing program 1: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x187500, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth\xa0\x04to_team\x00@\x00', 0x500}) [ 547.669995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x4}}], 0xc0) 17:05:48 executing program 1: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 547.709735] audit: type=1400 audit(1568826348.130:3758): avc: denied { map } for pid=24367 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 547.811021] audit: type=1400 audit(1568826348.160:3759): avc: denied { map } for pid=24370 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 547.847410] audit: type=1400 audit(1568826348.180:3760): avc: denied { map } for pid=24371 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 547.886073] audit: type=1400 audit(1568826348.200:3761): avc: denied { map } for pid=24374 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:48 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/context\x00', 0x2, 0x0) write$selinux_context(r1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000000) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) 17:05:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'yam0\x00', 0x200}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, 0x0, 0x0) 17:05:48 executing program 1: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:48 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:49 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, 0x0, 0x0) 17:05:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/n\x17t\x1ftun\x00', 0xac401, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=""/4096) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xa00, 0x0) 17:05:49 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, 0x0, 0x0) [ 548.563308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:05:49 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000280)=0x1) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) r2 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0x2, 0x4, 'client0\x00', 0x4, "867987dd7b7cc9d9", "de45d0d50a40520561e4c7d990c0de3ab2749e402029f9e408561afe26203b0c", 0x9e3, 0x6}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'~rlln\x00\x00\x00\x00\x02\x00\x00\x81 \x00', 0x64b2684717d93bc9}) 17:05:49 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400100, 0x0) epoll_create(0xfffffffffffffc00) 17:05:49 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time=@time}], 0x90) 17:05:49 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00', 0x400}) 17:05:49 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x7ff, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}], 0x60) 17:05:49 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) [ 549.377960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 549.414445] vivid-000: kernel_thread() failed 17:05:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x2000}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:49 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}], 0x30) 17:05:50 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:50 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:05:50 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}], 0x30) 17:05:52 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='eb/\x00\x00e\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x204401) r2 = fcntl$getown(r0, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = open$dir(&(0x7f0000000500)='./file0\x00', 0x480342, 0x36) r7 = syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x0, 0x9e4c90db0514995) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r10 = socket$netlink(0x10, 0x3, 0x3) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r12 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r12) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r14, 0x0) r15 = getegid() sendmsg$netlink(r1, &(0x7f0000000640)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x208002}, 0xc, &(0x7f0000000200)=[{&(0x7f00000002c0)={0x194, 0x1a, 0x800, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x8, 0x45, @ipv4=@multicast2}, @generic="b5e151bba44bb36a1d47833a01f290282da28bf31a145c888614d3979002d08c2ff028127591da5e71946fba596523f810de16d5be79f60c6715e0c749d615da7ed5d0f7965a4214c53c48a2367ce9a575aab83ed949da4299eecdc83da4316cf52017342c0406500ca617907a2da9fd895647e447e5c253dab45751c38c3ee8e03d10a76cb6ff22e8e8c8ca03125c4bbe", @generic="5330752420bb210501dbc24a5e5046424dba6a1d6ef0ad45982f33fb49a2017e0f6fe03b9693bdf7ca8cfc2357479aa38e6be4b438516ac5d1ab0487bc70e762e084a6ea5cda88ab2f576c8d42d1d6d7a55099a51c9f331f99a3607e211928658d451d8c5d69dd67498b9791b40fae4488e79d754a02f82ffe438cec55993f9a18544e9ff879c5ca0fa168bb9e58b185afc218f9577aa6e188e2eeda9670d294048ef8a0ccc0a95a6b493d61cf636610034531d8f5cbbbd372bf14be7944b714dfe1bf4a3bc60e1def8f8e4b7bf3802a7be64b713c69332ca5431d5e28f9553624f5be4e9fd234e1d7c282"]}, 0x194}, {&(0x7f0000000180)={0x70, 0x25, 0x400, 0x70bd27, 0x25dfdbfc, "", [@generic="0fb33dc4dd2bacf55f12267d7979eaf84f6434c0056784d7fcc3ee658af986bca634fb19b03c490445b8e5b68a39ecc9090a5488ec5e6ef3b4243ce8fa640b5930cf4e857c0599f682a7a0ed72f42d528f35164f9ebdef4720d57fab1c0aed"]}, 0x70}], 0x2, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {r2, r4, r5}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r6]}}, @rights={{0x30, 0x1, 0x1, [r7, r8, r0, r9, r0, 0xffffffffffffffff, r10, r11]}}, @cred={{0x1c, 0x1, 0x2, {r12, r14, r15}}}], 0x88, 0xc4}, 0x4000) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r16, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNGETIFF(r16, 0x800454d2, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r16, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r16, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r16, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:52 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:05:52 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:05:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}], 0x30) 17:05:52 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x0, 0x0, 0x0, 0x0, @tick=0x2, {}, {}, @addr}], 0x60) 17:05:52 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 552.361478] kauditd_printk_skb: 31 callbacks suppressed [ 552.361486] audit: type=1400 audit(1568826352.860:3793): avc: denied { map } for pid=24496 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:52 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:05:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3ff}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x60) 17:05:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x11c0366699538a8f) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x80000001, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r3 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xb384, @mcast2, 0xff}], 0x1c) 17:05:53 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 552.496090] audit: type=1400 audit(1568826352.900:3794): avc: denied { map } for pid=24503 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.573183] audit: type=1400 audit(1568826352.900:3795): avc: denied { map } for pid=24502 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.631104] audit: type=1400 audit(1568826352.910:3796): avc: denied { map } for pid=24501 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.663324] audit: type=1400 audit(1568826352.930:3797): avc: denied { map } for pid=24508 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.691058] audit: type=1400 audit(1568826352.940:3798): avc: denied { map } for pid=24509 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.718742] audit: type=1400 audit(1568826353.030:3799): avc: denied { map } for pid=24516 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.746936] audit: type=1400 audit(1568826353.040:3800): avc: denied { map } for pid=24515 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.769242] audit: type=1400 audit(1568826353.040:3801): avc: denied { map } for pid=24520 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 552.791756] audit: type=1400 audit(1568826353.110:3802): avc: denied { map } for pid=24526 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:55 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 17:05:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 17:05:55 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, 0x0, &(0x7f0000000040)) 17:05:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000000)) 17:05:55 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 17:05:55 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, 0x0, &(0x7f0000000040)) 17:05:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 17:05:56 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x4, 0x6, 0x6, 0x115}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000000c0)=0x9) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x9, &(0x7f0000000bc0)=[{&(0x7f0000000300)="d9fe1a8bd73e84628b8b43bd90f040d6b9792724cb9ce74b10fe1e9f906a7b250e03fe480357a9fc86ff76d3019863731d0f9da3847704e7045b869add096adbf5e3d1244eb68f9809ebc1a6e442120a629d519634c21c1aa40e3366e1b03212b5da972e1b040fcd2b85b285676178bf25a64e3fc9ef152fbb59a4947d5f7402811e66ac92bd50af6944790ac9f3664b8e3d8de938725941629f587e0f5842cfdcab02bec73742429520b09ddd45da7d9f8e44d7e665c02f3de3039a73d2da6994961d340c", 0xc5, 0x2}, {&(0x7f0000000400)="51e9bf1501dbd81c6872904e9573513a5cd6b49dd674a92595003405cbd326218a61ab6155941631f116b2c016986dc75aab7955427d51a521d2edc7f87668c5c4dc1ef73a03994ab4df68687687460282d987ac72f832302821bb9f52da10870de3b423f4a60028afc66eb161423ec4fd2abbeb1dc7b0c84994e339810009", 0x7f, 0x100000001}, {&(0x7f0000000640)="ff85172cb6c5d50aeea16466edf30148c05861c18bfa4e7a80ac40f5488773ffa75dda1d5cb91aa774edd4d32a04f3acb5e76b15d935ff6af894f3fec2ecc5fd1c400903ea1e3c89b72311643b31dcc27cd9e7a93882263610e9c08230fa1887626df222811581fc5426dc7bda0fbc65d619a01e40c4d03205c234957ef2508b13d38b26012f4d739a0dbc07b4aef22e83855d5373d37febffe28de5ffa9fc398f6389f07e156b1e3545b15fe0bf62a8259970c1a053103fedefa1137ff38f667964", 0xc2, 0xaa0}, {&(0x7f0000000740)="84e43be989c5825169fd9df7a3466fadef1fad0896f2f9a83c59cf59403b974c6cff4ed0b8b1bbc188e465bfbd3748182499f94a000c71b96777de231e5aad83bbecd7990183e7a2b8fa8265fa2e771de01518cde4a7a472bfaa9adee5fbd24ef946d07757515a601dd38d1c", 0x6c, 0x2}, {&(0x7f00000007c0)="7824b9ce70715fcfdd736270e8e1931113b4acd913efabc420cbc92e74018dc7108598f48bb86be807e642fb765cc828338b723b1da7339ae95ecce60122294e8654eb495b77e5584e927ac4b5b4e59fe2496483f46b7b3a176601594b4441972ba0dcc7bff2cb528e4442b16a910267c370d2a61f102eb349630fc251ee2497490de5c9ada5a3ee8312c85935a99c279bf1c6e99092c238ea464768ab485c01a35b191318c5ba", 0xa7}, {&(0x7f0000000880)="98444308caf8c57c637b59baec9dede183313fe76b72d25af6abbf6b378d8a95753f", 0x22, 0x64d}, {&(0x7f00000008c0)="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", 0xff, 0x6}, {&(0x7f00000009c0)="b87f0a85f024c82dc5f6a8a9d5cdc13ec050fcba545cc7f79f4baf2fca09c31adc34e84883511d2971e45ae68bc643ca2631f9878ba0081b56c28e13e818b2dd91fd7fc059c7509d9c9673a0db2f0b3d5793806d918a5c2ab1e1394c113180d0ba2f0e59192a20e5cb648675328ace482021ecc6ad6b64de1ae7382482d8ac8ffabd3c3172825f55c2b3546e5a1bb38c9769fc675719d7c8cfbb69ec6722433189acf8143e6b2921e9a4737a20aa8cdd143d6c7f9b5ace7b89d45540aec7af31de59ac097beecac5696e0afb11bcc8dc72a0f2715866faf79cd5514f", 0xdc}, {&(0x7f0000000ac0)="785f523dd2e97a8dc5cfe657e242a64db1cba58e31e5c061bd39a1448c393ba305d2b714ee47610842f3a9a5c1cd7f699a17b35cb2730c5e53f231ce6499da64147f0f94c1c5f82ff652634e0722a72caec5e6cc76e45e8148c70ef782b191a3cbe2814cc8868d4f18a95e57cdfa7fd2e9f02904f39dd9e85c26306697b7c07fde989086616a33bc23622376c2bf5a7605a7e95cc8a765834d6a2cf84e85e624a86a0803ef2416abb7dc156a9d9d01af8da2ed009c1be0d297a2fe71c32563428d401cd0898affec84546af8cb9b7005789a455192d510ddb778f1735c6e7acd03575d35dd52bb736646c49eb39f9f5bce", 0xf1, 0x2}], 0xee64039d863603d4, &(0x7f0000000cc0)='/dev/admmidi#\x00') syz_emit_ethernet(0xff, &(0x7f0000000ec0)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@can={0xc, {{0x2, 0x7, 0x5, 0xffffffffffff4647}, 0x0, 0x0, 0x0, 0x0, "0c72af7208ff84d2"}}}}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0x2, 0x2, 0x8, 0x7fff, 0xfff, 0x8, 0x2, 0x10001, 0x3ff, 0x0, 0xfffffffffffffff7}, 0xb) syncfs(r1) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101200, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0xd3) 17:05:56 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 17:05:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 17:05:58 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:05:58 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, 0x0, &(0x7f0000000040)) 17:05:58 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:05:58 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x52, 0x8, 0xff, {0xffffffff, 0xfffffffffffffffd}, {0x1, 0x401}, @cond=[{0x4, 0x5, 0x6, 0x3, 0x6, 0x101}, {0x7fff, 0x1000, 0xa, 0xfff, 0xec41, 0x10001}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000002c0)=""/227) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000000)) r3 = socket$can_raw(0x1d, 0x3, 0x1) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f00000004c0)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:05:58 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:05:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x60) 17:05:59 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:05:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x60) [ 558.473847] kauditd_printk_skb: 18 callbacks suppressed [ 558.473856] audit: type=1400 audit(1568826358.970:3821): avc: denied { map } for pid=24583 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:59 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), 0x0) 17:05:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x62042, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x60) [ 558.565088] audit: type=1400 audit(1568826359.030:3822): avc: denied { map } for pid=24593 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:59 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) [ 558.593996] audit: type=1400 audit(1568826359.030:3823): avc: denied { map } for pid=24592 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:05:59 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), 0x0) 17:05:59 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:05:59 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 558.678115] audit: type=1400 audit(1568826359.150:3824): avc: denied { map } for pid=24601 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 558.702523] audit: type=1400 audit(1568826359.150:3825): avc: denied { map } for pid=24604 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 558.779738] audit: type=1400 audit(1568826359.260:3826): avc: denied { map } for pid=24608 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 558.802271] dccp_invalid_packet: P.Data Offset(4) too small [ 558.831034] audit: type=1400 audit(1568826359.260:3827): avc: denied { map } for pid=24609 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 558.861054] audit: type=1400 audit(1568826359.340:3828): avc: denied { map } for pid=24619 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 558.883231] audit: type=1400 audit(1568826359.360:3829): avc: denied { map } for pid=24620 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 559.228637] audit: type=1400 audit(1568826359.720:3830): avc: denied { map } for pid=24623 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:02 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:06:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:02 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), 0x0) 17:06:02 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:06:02 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1005, 0x0) r1 = memfd_create(&(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000280)={'ip6gretap0\x00', 0x4e58d7eea9e0fbf8}) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000040)={0x0, 0x1000, 0xfdd, &(0x7f0000000000)=0xfffffffffffffff8}) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) 17:06:02 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:02 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 561.534209] dccp_invalid_packet: P.Data Offset(4) too small 17:06:02 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x7, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 17:06:02 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 561.624350] dccp_invalid_packet: P.Data Offset(4) too small 17:06:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x8, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r1, r2, 0x0, 0x800000bf) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 17:06:02 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x81, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x8, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r1, r2, 0x0, 0x800000bf) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 17:06:05 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:06:05 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:05 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xa040, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000000c0)) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000080)={0x3, 0xfffffffffffffdeb}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'veth1_to_team\x00', 0x200}) [ 564.536875] kauditd_printk_skb: 14 callbacks suppressed [ 564.536883] audit: type=1400 audit(1568826365.030:3845): avc: denied { map } for pid=24666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:05 executing program 1: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 564.637243] audit: type=1400 audit(1568826365.130:3846): avc: denied { map } for pid=24681 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x8, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r1, r2, 0x0, 0x800000bf) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 17:06:05 executing program 1: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 564.723517] audit: type=1400 audit(1568826365.130:3847): avc: denied { map } for pid=24667 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=91363 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=0 17:06:05 executing program 1: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:05 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x4, 0x0, 0x400000) 17:06:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) [ 564.817113] audit: type=1400 audit(1568826365.190:3849): avc: denied { map } for pid=24685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 564.884990] audit: type=1400 audit(1568826365.180:3848): avc: denied { map } for pid=24682 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 564.914527] audit: type=1400 audit(1568826365.190:3850): avc: denied { map } for pid=24684 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 564.945061] audit: type=1400 audit(1568826365.280:3851): avc: denied { map } for pid=24689 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=90940 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=0 [ 564.974078] audit: type=1400 audit(1568826365.300:3852): avc: denied { map } for pid=24693 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 564.996374] audit: type=1400 audit(1568826365.350:3853): avc: denied { map } for pid=24695 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 565.018760] audit: type=1400 audit(1568826365.410:3854): avc: denied { map } for pid=24698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:08 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:06:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000240)=[{0x5, 0x7f, 0x3, 0x5}]}, 0x10) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/225, 0xe1}, {&(0x7f0000000000)=""/40, 0xfffffffffffffe75}, {&(0x7f00000001c0)=""/65, 0x41}, {&(0x7f00000002c0)=""/171, 0xab}, {&(0x7f0000000380)=""/67, 0x43}, {&(0x7f0000000040)=""/60, 0x3c}], 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4(r0, &(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000540)=0x80, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x16, 0x0, r1) 17:06:08 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x61201}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r2}]]}}}]}, 0x38}}, 0x0) 17:06:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x101002, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4800) sendmmsg(r1, &(0x7f0000001840)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000140)="bee562d73cc5c6ed09963ecc5f4f437d29d564893279d5594b2d18e873feb4ca82c33b82442faa59adc26840ac8d0fc76046facea4b80a", 0x37}, {&(0x7f00000002c0)="b242b0dd26934eb3ec30511ba5c8679f3ee87e26d030fb4c9975bea67a2406b343ba4c72c0ed493e20279bb83a923c77fab20d7232cc2d0ad974174ba622c62ec07650ebae981d31db3f14a0aa1f76d5eb87636cd7fcf7a4f841bc8fbfd56e2b716fe9ce87e672be19469c120a1d81071726d09f668cb1885403c6b7c3cc5462f25b989ec53fac6a4a4f2bd96dc58204aea063b254b2f3243e1630fc74dd24758fbf9d8be64b7c3f55259b608ae5ec3c9fb85eeef54d526b0483ee9211f50d35de23b6127f1fc851f4d3b8e2b557864b630bbbec9c61f1580c8f12836a045fbd4a15b5484d22d14050e138dda7cefe90a77b11b1ac95f272bed7cf984763c1b8a9de41048165ff837e698bba167bb64fee8227559846029b08a21d2913ec7618b60c5afddba20cedc3a976217a3a9a0f2b75c574b381ce3b84495970faced3e7805af5a0c16ed501c5a272513dc185ef6388a237e5328f8e166e82ab3bedf6ec34131ef933b49bca82d44d2e1a8a6e56651247c6096c38594988b48bb9dfde97a38240790aa1aa252c0be8ab24bbfd06d5b6f7a24a2c6ae4347d8372299e2c6ee1ac3ebf6e3703acef87c7805b47db1c42aff35a052f44cc5ce5da709c756503813d6e488b2bbc89ab2e7f8acecec41dbd539987fc92de0ca829ef593a0982fe00bf32b3d4daabd1835b9a53a153876c0112194fa6436cb191ac701699819ee6434f1b2073ea73ebab7e6b6a10409f1e0752cbd34b34faa8c32829bb1491eeb4824449e28d562c65734467e4171d82b5e5155b9d7b04787077f5224b7ac568b2f79e737a3e364409bdc87803c9a7903b282ce8046721b4d0d06a5b7dbd302e38321466c9cb33e57cbe678a2874a28d35d4b339ee292e003540417bc852203db110b28407b353ab5880e441ee1df556d94ab1f4734638ac839943568fceeaeabe7c25a1a53b675e4623491d2d92a07418f6451915bc65dcfbeeab168655c9734d8b2c7d7a4177ed5d12f9f7e58d1d7c7c2951dcd4d53db3108d72e542562330b77955f25fc7a8fc285cd3025d1ebc0e319e64718665c7ffeae7b4570f31c6c8172b9f9e009a2382c2d62c0cfbfc86bd3d9fa23e116ec556776f99117c601e767e41be644bf31486ef7c7c0bde139adc52bf3d30e6447eaf38f585c7d2e977dbcdcb9a5da8bf4c45c852b0d3ca1979550f2e0950200f31a902e08c61bf678a5f391969316a6967a5333a5c2571f874801cba596aff0fcecfee1edc919e14ebbb43412eb11491361cc3deb762f502ed2f6927d5263888818e30a1d9553bbdf0dcd7333f51b6e21c3a71260b95945053da4d461f5d87d8cbf675b5a6f5581b888ca82b153e4cc958305ed03bd93011c41fd95fd2f287e779d036e5c784b1c46cb520ff6acbe7767f62e01c761e09fe5429066d71f83c8c328c31a6df462cfb4b2befdddd23e0bd6974ee71ae34b2570ce20ac61efaa32fdeefdfa7b19ca97062893e7b0deaca3c2a4f02a5ef24df4b253c33d1db4561ded2212f186bd545e89598dd12f2f104c1f05032948fd9692571e3dcdfe5ea04eb2cfed675c3c76d4cb860995f4929c30b821d54814cf7720007a9678ce53d7d9e640f695c64183903e7280360043bf8553c33423286c1a8bb97a0a0589ccb2c190aa794b90102ddbb6a9f27079b50656ecd8b4bf91add1ee24e2c05041b44b9d896ec0adc828953c47f8b0c62ade829babd47b4dd40ce69faa8be615c6503677bc98e709f4b042c514f752f8be4daa5da93d2511b27b6a2a61b45ffd2f3dd111f2203fb247205ecf3e812a52c0f1633a4eb78b07bc30dd8cc6f632235f7f2e0459a6462998735897bca596d3744993b1b1c3c02d89f972ac7eddfb39058e2bf07f03bdc758b317a027bdcb689c43a0c09dbfb7d021bc8f402f6c73741847857ccc0da37e6eb9f0a2fed880f7c7ee584276eeed50381bec4f309f5ff3b9e5b988962fa8cee92c958907686ea25f031319125538be668422bd3e03ae84191ea8076057529c8fa58ab1f96646c3ab6458b785ed3f9448ccc1c57107acd3058bc5f9618d06bd85bda44a94288466e3686ae207dca276701f482c8459b4665ccacf8f78aac65916edee354b6ecff8f0d79959e988d6d280241061980b89d05b21c632769c3742a7162739283f3793f23aabf2d5a932907b9065640cd3658c48996effe9b602e56701b286159188f377344bc3976f8359e73b8474d9ba4b94029cb80b5ec5322c95d505c967c0ede1e5b3f583f69d05752939430cf2b8249278101c73f950ca15c4848c43f2de6a415656436c041ae4be61b9df61611f84f2e77221463174e95879f2a2f267d48710d256897c2d865a07c1372147dcdaa58c66b510f03b2546cf7bbad2bc16cbe4dda3296ac70c63709b9a1637e1c0373445124ba31b7773548bd0bf918d4b7aada175a1bc7e2b36c51b8cfcdda4c52a9142cacb3241230e7278b7f3bf769f048fb4aa1c402342bcddfeb5217997af556449c5b39939f452c466e2adffc71b9a8c03856178b30b2b5bd8e078f45c1be88f89583dc82561a6570ac900dcbd5ccda9806acb350ac464f3d6e25d916d11fba74f43bdbbf86c7e79780a2a00996c3cb309d1acfa613873d6f497ffff677db7ce0d1fb6d5f7a4264f4c958808818e1d1ae583eb5a5b2b746886469211434a3501b9b0846aad024a448d21ca419c1707e2f94c7b23d31a01927351ec9f11c0531d9caefe56f87fdb4da2bae8e748f5983331c01785bebfe2f5788c0b0af2188a400d15389636c4afe1ef458ab926ba513f0c237a9e2a0a64c39c97bcfed22cab7e57872f2a529dc405be481285e51d23dcf045ddd444a66bbcd8fceab0fd8a4d9898d35223b07a95495d944fe3730de6191fbe2e7b2f2723f70d33b47360dec86d818f4b5ada3001e8d18684c38884a05f62e1b32fd002142cc71a013d51071124065b2a5aadb59abe1ab4c082dccbd1e4a816ed0795713340f99c2a9b98a4e61d1e2b97df610d7fc67e0acf392796b54bc047bbb9bb90e6c6caed0afc1564e3a9538ee2db44112e69cf88092826d4c33878fe0c47f20c95a42bb8b63f2b5652abe596047682a85c2e284857a606e2be34f350a4824d85855076ec0de5d9f11a3abb51dc8b7f1f89f8ca0d084efdd082db966368a49a41b95e539924ec2a464f54167e44c0dfaee3cd3d8f4abf66b6a3cc40be00ab57d8e7dbc6e5695a52bfb2a043b566de0f79fd3b3893cf96d7c96f1b4bc23e192023eb30d363dc21a3aa422b3b6b6139e2927bafc7ccc541ceeb7c69e3334bc98611052d65de543988b315e31a3e13f442de748cd4cad977dc6596d5de22ab4d9d5a8389734c2e682232302bba5ba0170be8359a33979be1b73320e9927fa45ada9c5948b6f70f1b4510163e940e0fe12b61e7e18fdbb9b848d30e74042eb3fdafa914f55c2d29663a128c128c26a9f4b470760dae55c94fab68095c7d928065af067f50c62847cf23beb0bb54ba269c3663d4c1f5fef49f63e70c0fce96bc37a6f378003f6c1e5b8932d24c9c1ace05b6e48636801deab0f32229489081a227ead131571f1a2e6c8fb9c4306b4f04f91b23269a86afcca25feaf2f4605b3b258df26f65b7339ec1bf62096c30845864edc015da866e2d02ebf4d94e5ea5f98b445756084784bba76e6a59c3e1025d9e675a16c36588543946ac901638f80268aabe8b4d89cf7bc6f219fe2fa920466bb832a3d12dc32f9176184b4fe9d8c6df3e3fdf42cdf81b0cc07f90b278edda8e8aec853adf4bca979fe56f8910472ddfe33f8ebf0b81090acf6a0704cf2e8951a33a672fba2ca006321c072429793e3f75e7c16fa9d8e161f4917527881561f1632eccfd6b95516f55d90a70f31063d23d1d3aafbef0fb09f457906f8ea171f048d56d3788388435205c6b5b3a9862c0024c88b1ff365d160755de1ede94f824c0370f69af66c0354f3dfeb7810fc1428ea083ad869485a6a37a25ae463ce6aa3507eb2962bf829c92323d9fcf9928f2a6972e6973ab4a47493b48efcca366d92a281483979234125e1226aa81e1ada5775f25eda8ded2b6f9095cd3cb9fc611d297e9c3e159665380513549e1d749668fa3738734f9e4c34bb84386ab4b02b961b9efa70f9339d9e83ce983e5b4b7509f8009eb192375435ab5d889c7344b70ae57cc6379d508d560563fd5277a7c16bc26c3da6be894d2386247b17fd9804a27bb82050735caa895258b17972c604c9dcc6773f47ab0a67f7c17ae7f02f19f34250eca7b68a933ecf2cb949e32af11995dcab954a1aece57ac6ef771d49d1740885a3707b885f88e10a24bb16f0aa72b4f97d581e725e3e40ff94361b7abf7b6637279ac7b23f98dbf79e444f2749dadad082a95710b0bcf748ed9ba9daeefd73cddae875e6c4d797273e9716edb41aa6b8f23adc5feb3dc125291f986eac8d8ade9bc8d758132a1ebfdbd2f06c55404320d90f7701b15b599cd65ce4a3c3726958df9e5620cd0c82506a22ca4c64700b7c2272bcb4a98444200ca9643531ebab6537f737d6ccbffeadc0171c99cf62f39a55622f5ac0aef6e85d9056dd624595007e19d9b8a0afa83b2218a46a8ce7a06fe5ffd12328b1835d7f40571aafb2912f746bfbf02409bdf0527f5ace2d4cec2d40a4b7473789de4079ac31784425bf07d84e604a7d0ea6ed09860b01402ff01e7f40ff91a8a9a03383a5123507dd5e83d036ad3568bccfe80fc63d599d914f103216a978518412e1ef885b6f2bd630ae4906319b63b683acfb9621d6db12c6ffecce4e47463a34791527e7993ab88b9c53e9a6dfb4de1dad9e391bad969695c4b6041131c24acc79a43fa15a0fa6bff6b60508a0cbd57e3299d0ef73ce2de550ef1953fa9460c1114c345937df07f254b69b95fed98ba7afc82bc33f8ca6dd093fc5e462465c55cbea7a147eb6f9e18fd86af99492c6c24a877a05ed465d7cce73ceb826ec5c33e0a6d6c9d001a7859adfde326fc2ab801b9cdb8bcd23a8b330e007a35025d066458cc5c411d913c9b264def5449e3ceddb93f053f3e40791fdae96d8ad6e03322105061e0fa4bbe7106ef29ca91bfa0151adf56c16fee3a4d6c217e1b79c607d49d0fff6564ddfe13bb7e9a13db621b0cc2bd2b34d89c0b3dc4494201e81de7c722318dff34ae39769706857aecf284459342b17920beeb208f5725b051ef4ddb2e4b9b3db29fdcdbd5e7eb650ca9e426abef466ea35e976419f0e16b85dc21d6bce42abdd7142fac03964ff17d12c88ffa862210e5285c0e48f92fb803b9bb0d0ce619970cd168478d1171df88c651b309edae669bff919ba9f4f6baaefec6298a76b1ec860b0b55b6ccaee85326eac9d0370222e410c24a80c9c92dcf307cc8cc40010bcb8cf0dea2718dd6f10237e265da95e9374cdad1e159438b5f394244a6ceaceb6397a070f17884e785c163f543aa971abf7442bcd104016c55b9e578092050f1bc98f131842bd0706c05a50d0c92ace23a3390d21e06e30d8c794612a785d4bf87249c88b2aa4df9e2c27cc85f92f1a20223b0216aa6ffaff576f5cc7ff47601f6f6a71823ea3a7c4c1eedced782113516d780d00d408f608d4dd7f31f3196391c16597c047d1aa7a6fe06e1802f01886ef3741e78e87ac465106a59d268ffb5bc6dd2213cd3672af5f59484e0aea0e300763da3b7ce249e04258dec0703f35f50f7ef0d0c0a7f036806d1efb6996dfedf64500a475bfc483e6f37ff8d25da802353361da44a29a6c689ab795b888", 0x1000}, {&(0x7f0000000180)="96d84db00c7a23cb65ef68a07128158c555d86880e28cb7bb5dfabc571d71413b5487bdecfae3bd490f7e52b047972537ddf0aab43afd970dbbaf35b1dd233c47dbff41fe60e2dd727a0dd958d3ca8376dec72ffd5b3ce15b470f51bcc502fff034677", 0x63}, {&(0x7f0000000200)="4da25f48d18c173fbedb0a4c7109471915f958c10abd6b5d5f0213413499205a43243f38aced6e7860314eb4c4e97645ac2985a9ab04a667ed527442dc5468ef2b59eb539231e2e3626a87a1b150e6357b6f", 0x52}, {&(0x7f00000012c0)="c83e21074a79e61785293b90a33d0b2c07bec6382dd52039b93332147e85c39db5d62a6ade86c090dfd7604df99ed9ed3d14735130f005390974d796af6ef3285af46bfb87f617f06d3f23d607186b85f651f90db3e70ea964cd040688e7958d4286dbe70fa610fcd6f4b917b7dd4e8617e43a37c4c811b445cd55e0aa802efa564d32bb7f7725eca63e20a3e13d687ef46bda8b03d168e70cfd551e50554dfd87f421b075e48c0106388aa6623affdcdfe98389a907135dff707baf64e1b3837afec3360306d75cb2200c74b451d8540fcd8727ee162b83f2a0", 0xda}, {&(0x7f00000013c0)="750f01d7bb921c9a3e709533194f0c418baf2208509ed9361a006d8034061c5225714cc14c02069d6d9e4b214ae68cebcb5e5e21295e9071bcfb24ba2ceefd7f802a834e1b0f33b13bd5f442af3b07f1feb7b6b71968ebcf764708618951cf2e67b7dbdd569b638872d893c1b5ba289c550c1ab7565032d9aa09e526dfee822f50667670058200708e238b8caeae475f67a806cd777cea66ff76d0a4c6", 0x9d}, {&(0x7f0000001480)="d6d9b71cf7d1307cc56d86740a503cd429790057ff5068eee0526a8e41ab883e98d2200734083d21db1e18f38621218340bdee6eaf0aae05d26b15102e03065b41e5c44eb6fe963ff283f22dadac50405bc6de87f47116b4e21183a061fa7d506e453472e2014ba5ae0a4b6a00cdfd423e53a58e1363c98a86b0706ae6e864c1b180cbee58", 0x85}], 0x7}}, {{&(0x7f00000015c0)=@ll={0x11, 0xf5, 0x0, 0x1, 0x3}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001640)="dfe5add61bca7f8860a4b3f094441570133cb72d17f2c77b408166ffbf6a875c658c9ba9bb5d1e06bb5f12529b7051b4abbb81f9e9bec1b906eb2a24287af6312abffc30d459d95e9aabbfc28f0f627092bf3a7d6e34363db0d690c8ddbfbfc3", 0x60}, {&(0x7f00000016c0)="055dddf7e15b71268f56a8041424d85fc317cc9048022181ff76fa4ba000aac851d3", 0x22}], 0x2, &(0x7f0000001740)=[{0xe0, 0x3a, 0x68c, "710042bb252f8583e5f78daa0919cd00744997195416ce410ac946bae3aac8fda889edc35f50a7c8bf838e56d16e561c2cb9aff08edacfb8c2c005dbbab8ec3aa04d6d041c0d951748bf1e1e53903bdb9aafc3d8ae1688b6a8f58c4b9ec08e60b472e22aa6f1da9093eb83e5892f1e71fc27380ee4e94691c89faf1431be01e6e951a77777cf37e2346b310d894bb804d384e4167ef2fb33d9b9949df03cbdb10cfcf73cd55f7fd3d0776e07d02ccdbb35c0c757738976457260831cf51d5a51fdb76acf56a6e47dbb"}], 0xe0}}], 0x2, 0x3f1eafe9f6c42034) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000018c0)=ANY=[@ANYBLOB="0100f600ffffffffffff049a5ef549e0000000000000d0e8b3a8a00f780a8cfac6b42b83d9bc7645aaaaa8aaaabb03000000000000008f3ba16d68f3d174f915c02bb5743d01b24949bb1231943eed11b11f9b78f034fd18cbe773073503cc91bd61e4f47ab96a88ccd71bd30fbf63804a6fad1b7d229ed1e0445df96e4843748dd8f46fa98a8edf3a25889d69e1a25f117eaa8aa45dc9ab192c98e5acfbe88d8485dd16b209221c29e3083e3f3cc340500ea6656d3eecf1f66de6f3c31cff8276f274c8ea9c4c25811aa1e30268744cdcf14717364e6e9c2f626519c11e554e7107"]) 17:06:08 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:11 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:06:11 executing program 2: pipe(&(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) poll(0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB="666900000010000000000000000000000000000007000001040000000062ce76ff1684801c"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 17:06:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000000c0)="a4c4b76812f31fac96d91a4fab72fa1c91013dfb3c1002c0fdefa9e3ef8d483ddb695aa9e5fb46dde14ca95d0919ab1cb23b9df92b3abab1becd6652dd6eb5c52511838e8e2ae8b7be93c09d22cafa966dd2c823e5ff5f8b78b736de", 0x5c}, {&(0x7f0000000140)="5ec86d45f3b95c5e91a64ae49f01206d7b645bfd94e4731490e87cd78cb340b4b80b62d11f95f72330876535f8feaba91b90123e25b867eb00bdb099bbde7ca9be56636134871143b1f2e8aa7e38c2063570e3d0a809bcec0103409905f14d1a1361cf7eb50fbfbfa0b5ec3f6df799af1207a30170fb3c3bd1643108c30cc2c00abd0b3b69355358fa972f3a7c2c5b6a871fa3f05a26de301ad683c42c94de5df1b1728cf015092080a6ce3ba718e6ffd207d437402902d8bccba4afb32e7c2eefb7503747cc5669043e9551c22b69e16c9266b42cc75afd2b929ccdc36de95fb7f9", 0xe2}, {&(0x7f00000002c0)="dc418db25f9cf2bdfdd6a43edf00d4d7cd91f09152537c2eae6c43bfd0ce9ad811965814738d25df214826d7852e8c6368b1cf0cc40cd498e3a4f9e83668934ca7703a2a831f8d6f8cf264dcb9ed46999cdcdd404a0dc94881c98597493a022b1a2f11e24993c3b478335977f8608c9011edfef5b15b4a01cc539390cc975b2ba2142403239078a0f5f011b26d4bb098c8811164056f07839555eb949bb37be36775a58c0b94f80eb0e6e2a2e29ea3ab9b281a84fb80f8197b7a31e10f9f7b9ae931fb451675f712f40f75be72286d6c37ea459fb91c838a3297e54ac0c927af", 0xe0}, {&(0x7f00000003c0)="a3b2a0d7b5edb8fe7057bce8be59cf4f2b950d1d78315af1bd3a653f22ebac9469ed4c6e8660425ae9b83446a53587bd687ccbc0c9a12e3348039669e7caed3e876b6ca227a1a888d5c10ec9d6e8145656041d71156d6a860140e0d8715eaf8fb1596d6addb28fc0ab24d362bf876121f8f7ea716bdd41b88aed3d7cd4c484939bd30aabeb127b60f369125ee82b7abb8999807286735b9222e43d5446ed6f7fa43f95fb4b213acef8ebc92c409eb7a50c7ffb1c2be1a9a81d153e6b4690ebb198c93b68052e3e717ba7dad8334b5375623ca550d78a59a4", 0xd8}, {&(0x7f00000004c0)="d32bbcded90c6ca6ff30dc81afa2c4df478456d633fe85b07be95f0f23d68ef0dd7c2cf78bfb8bf98a7b23e2a9edeec23a23ec212e3dd5bb64e378aec2bc7b92251e12b1", 0x44}, {&(0x7f0000000540)="d08949d49ce110602abf65011bc66aecb2780265bd340b5c45255baf55086436b772d8afa1003b1c3ad792eaa2a9092b1a20d1a4d0984026f855962d521995eb55e09d7e4fd61868f50d9fcb5cda214d2731d8c61146ba2fd5b33e", 0x5b}], 0x6, &(0x7f0000000640)=[{0x451, 0x114, 0x8, "c2144966b416e6ee50395957563b30c103ea707e848f2f17bf5f94ce9a32185170a1bdf7bd7c43b1142edff01a2204607e16d3b0d9e1282b0d6aa81e4585610a5bd807226d2bfca69383e9cfb3d5bbb6a906f3635d36bff6ff59c90ae4d19d9992d5e419bad38a68b6a7cc8470127b3a200bea987ad9578ffe5070d971c190213e89a5fd3e5b916b927c1f"}, {0x50, 0x49e430a0f8f13fe2, 0x0, "d1cec915c95b50a55a1f3dc0462d36c56853ea05c4067df1b0dbc4a997fc61dde0e4c46d12da7ca634c9b15c46f5f5c281ba41a57095ecc104"}, {0x1010, 0x107, 0xca, "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"}, {0x50, 0x103, 0x4, "be93edd16894559ecc6b7498248e0b9e3dec8a92763ae9578867f99c8a1c02de184fa43c7bac0a0bbd75d731e41da223f3fcab4a66863f35c8fa73"}, {0x1010, 0x0, 0x400, "dc87bc22f3548647fd7fe619faace4562ca97baf1a6415ae4f8632500a2c52385c9c29b0e771299796211de3a453be6238a61566e39a6f127445df45e3c4b62708a5757f91b133c246d98e1e19cca2e5a8ef4176627baebe9411eddd1be3a59d0aadf7f36cdb87c5403be30823f0bd7e5c3ff93f9b00885927e5a3c0dcbe24f9e5914f90b9402a8188e9f83e2c28738eeab9fa7b4f58d2f6320e747fdad83baf9fb3989d1c65f07bf2915bb229963aa501df964ac8a5c77d83425123283fb85b05dce03a71d91e63816240383c115b9c8bcb3021573d9e4a08215d268258c3397faa18af7276fbcaf3471782246e77e9f264c36595df9a79f920573a702747db44da4a2e77c2fd07fe25f0fa30e1a54a99ca9700b81f1e9b18612ff6a6f16d0dec136304d844ca72ee64e75f1756c431e10dca03a5f77a7c432582639602f1a3049624ce522a1d81dc775c54cd1c84695d0adf9d2e73e40cc05faef49dee313acee5aed99e2bc239f37342eba19e7451c1de5afab657a9d4b23f4f4000def52ae6b98d6458db11205f402d22b83f99be1aebddbf569dede173db86d1203e0259146b0f3fb4112c898a295ecf949edb71de45d73a5cd8c1f0bcfe8f2fe360c401548822c765a3cef8d9835c111aadc39f7251175ac587bdd053594f726bce68473d2c6081ff494712458e9729b458a782775974a22e343626a9f903a873062e8d1a5cd5c952d946b681728452ec8d60b523ca9c7fd1e66138c59112c262c4364316053e3025462bbdd905ebc26ce0dac495540dff8ff546a88a3e0823dac460d0ee56e5fbe7c2999e7040d1cdca1d42266bfe099aa5cccc2c6e352783c5420761f01a2dd2f1b4bae18ba778a8a181445ee34994c93eb3da12bf26c44c17f3d6d0eeeb8e416ce0ef3ff6d023f493be402ed1fb2070ffc8ed86663e8510e76e67a263906a6e70895f33bb01f99f9ec323ab4955e171ba63cfc09a78067ab33a3ce61ed5384415e49d022c9f07b31fa1df21414dc8bec7edfcf6de7c4439cf3fa7a931c1e1d09bf00846ba4c987c9bdf5c520038a8afdad13f7a21b90d7102f00747350ff791071fb029b804ac2d3eaeab306cb0a79d6f1a57caf9d396ac91a5e9659104040e58ef4ae29b06ca4fd3be60c10f4727966ec49033df372b6d1b301a5a6eae0380758bbf3af0a2c12d9252ad5234b2bc7ada813c93bec77a42f511f98701b52d815da2d4ca515e3057646a8ca12c881ae6f21050d343bb9d1f9a0e8e3171464d6c0d0825c977a785dba3dc24b7deb8ee3438e65d32657933baf7846144c4f6ca739a1c49cafdc293522d6cd8c4ac422d99e15595209369f5978ecffdf290f72e809d7d9dc333dd63a718278bfec479d0ef9cbeb850417cdf089115ccc6daceb12199d90d0e80386e88d27c21401db9ba9e3871be10775dc1065bcaa37f89a210de61e58c0d495469c9106c2748348f8e02b000b88f780c413d12304e56e4b05a55455bb7a95fca9516c09d3ceb79351d3c059eed6fc926e0b5d7d5c27760dfc5c3b291b4e35132b5acb26834f44a3433c0dfc7af0a7b0e542138be06431a67cf55c61c519e35fe68bedb9a5c6421921c9baea3a66bb8402c1ece29d82e7e09ff75d224857f46dd6254b0b00780ca60a003ad130ec3b4d5f6d284cd723646fed739abcd43ce916f3f6749b7002545589534cec8dfda151e4d9c3721c70c129618d32de13b24c06c3377905deaf82a7b9beff87ae953bb3ccf8bfeae20657173c6d2439ec2fb3fb0e9875f749abc1c876be00b6052ff7df1c1cebc8e7d1be0bc7cde4981c69f8132c090c7f542aaf93ddc4dc480bbc5515e3807cb3d0c2ffb53316d23f14d804d40fa3e34f1ad9290b4ef01fe761d9879fabb9e5c7bead56714147a8f06d6961fa3f71f30f88fd0e962d0cd0ae8a0ac74585165d56a6de02189e3dff04b7856a8ea28abeb32929cefab0db8bb582156ac8eeeb2a176a026b3f5517c5cbdeacd012604bd51ad60039c993a19cf41d388ffbb68218ea153c8ad5cb24e56e2c5cb3d8f5733664395ed793c0fd0c0ad837050ee1113319b16307daac322d5fa50f9c0082f9d6f7add642bada5a7049f278991ce755940070470d3cd58c0a7d633d888f4222cbe6327541f68f8281608948c6edacd32515d362d0e49f343a5b8a37f985f4657ee50f773b26e8b7ad0d979f51f1faf5e54fbd2a6511264684b89fa8bb4ed1df0580dbaec378d68fd34fec0ffa1e619089a6afd4d8f0a1eecc393859dd1e8838d1b7ebc088e22b34ceb4d174ef3e0aa52ead4781872fa4032b297f5e900de2162d1fdb2a16faf8b93dfa9daf062e9283bdb3988774c490153147302802142a5af50dd621a5bd131561b4a2db4f3e2dcdb931325c0e3625decab842524bab5681a8ac2959dfde11d911505ec41d991b08ff16d86af554892d6ed124bb96eb9adedad8dff38c3994571c67b650939ed26fdc747a95c6e2b2277cc8a1f6e67f322260a4888cfd074d005d4b599e8ae7fc7a7fa309a6e52f7a1a3f65ad626fbae4116ea51837b85a47ec10c8493b89ee6fb7d79b55c0a0acb41b95b0cfe3a6253963fbb3ef3fc22ed015de335ddb5c784791b9e78722b5ffe5fac9bf6f900b08b6e797c34261ad4fbea294d1592038f92b63f1b98999cc40b00fcceb2ec9981b37171482c7e72554f4705b36d5c474838e6ed9fdd2caef5a11daf852d2a27305d275c2d89cc192b3c4b00ca310c7c7bdce1022b3bb2ca2f704cc05df1e04c58ea010dd322e30e23b32f67d54b309a7d0c1a3d85f7a2b727e0c00ddd8e5b942c023c9bc18309765b63014e2f0f69f8475d6b4e634eb4b32d1416a12fb148672f3eab78ab274b45f5a845f2b9a0131f2acf15b1c75d10362c82c226e89981d77705b22eeb8f1e13aa62c8625179cb27150dc173b20082002548c754bb5d7e53c1cd846bf8561a88b8af72465983969008d7add747c0aec7ca7aada833160d65aaeab1377fc6cd9293572776b4308268da7dbdbfd6b2613564c73f90e2f0952a62d6eaa490130c4b0b5085d1d648a80cb83012c56c1bd2d084bab7938fadf9113566283efa5aca643b5e9f51ae452dcb0e4a65c1c72bd65c234a280e934fcfdd64fe6afc80e74341ece2bc370e7440d32c023dece14c3b560864e6e1ffcb3530789e6feb3a38991266b374a0b7b77fbe7e543e18d54afa56c05cb615c131908b3aec0cbc2bc6690f855f6b31ec5c653c490c193f8cd0e72ea75395f076dec4ced492ea9f745cfb0e174914d82cd4db5b692795a49b713f745c3d38b5759c323ae0c2fa6f01b138459a6aba8dcf2166b841e7cb4bb3a1b289b3da273fd078f1fd842afdb81fd08f7e3b9a80815ecdfebbe47192ab671934208935fb1dd08b577e161c94a811592ee7dae2894c1575a933105d54635aec1e16164d0ae0ddd5820a604e70cd046018f5bd86189bc86d63c195ae81c7b76d8529639a0a3a47a745dd577cc3e2f6ed45aa570e74762426525e6f1a3e85951984074cecdf8beafb0ec1879d7485185fbf91a5506a994f5c127d695e8b0fc967e68eb48462f9cee1dfaf1ba5b16ca1a16326920b5c8047cdad0b671cef37f7de90987fd120c823cda9bd264b19ed626fdf0be2d6ba6a3ba77841daeecf7097171422eed857f1668769075da6c35628a4e89bd75e8b67c5df957a974c105ebdb5656659b00cea3e188896f6ed607672ffe6a832f9cce0dfe3971bcc99dbc4153006bb01fdc1681bdfa476c0979f7d3b862cdf8252984c979bb26c8cd79046a8935a5330a13745a994c96a0195c94cba7574d6c58993636473658ae10d26b88db227e26f6b2e4cb2d5d30dac46e5018e85ff18818a10bf6bca0f205b143c9a955723aa72979e5667ba51b4355abfce99a1658f58d1beb5d39207c6f29a63e1a1eb2f434c5de3f947496d48e4929d866993cc21ed53d5103ffbadeefa8167789777fd8770bb1af0cf16aa110ad1186f1f3b1f7c7b3c092e3d64a1d6c06437fb3a9ec5e76fc9b8ba3671d7f1e04ada0aa830297ad662790ea9e546e75c9cbe98a123faa8f78d744d99556ad067a4083c2426c5ebc5c4e2f847a454d2a2102cec475a2e8efbc7e943bfa4b16cadb7394f21113e1e0516d6ee3df63a0e9e553b3aef7bfa891cbb070de9cad5932f874691f8e1d8f5beea2e0666104c0b52cce07dee6dfe28b0ecc864dc5570eab5dfc545881d31627df0ed8c19b190b77e3ff24d1ac3a5894d7ca8e04ac249253cefbc4ef4c33ffd8dfce3b4cb10ee61128abd1abab7b77cdd62b29b8b569c671562676741b9e0edc964f8ab67aa0a02f6665954f3eebd2fbcf78e1db884d9046bbd635d66dc225595e5313f1622741a2c4857ae89a3436c695ac8f3294b25287434ea505af92f6b38d962081649ef41506c59a4728ebfdefe395c47ef8995618c0d086039054a8cb4540dbb1a4660d1ec56db001bb4bf45bce58d05c6f0617b1ebcfd8f5b26651065b63225ea38e58c5a7d27d06635342cf75c073c75a6fd98b461ac64ded716d1e7a823cdec7e446cdf40e604475e4732a5cad46d1fefa643f8b243527cd51630217dcda74874713d8391a3db758fd933603f59086bbe27514f1ebc2dd347a328dbe5c83f7cfd2fd6fdcd3665e14e166f9fc4418d48957beff7dcd6788f2f8e7d0571c6160ff0e07e753b1af51a689b5058f8b0aa813ab8b749dc67e8d9f3063ebaccb6f9e8c8a53419a758f8b58a8695ec333b98f967d7aa74ec17f04fee339b3e27109c86311118c2d7168b3b8a3d7bc81bd3a9518391d3d3edf2c2373fb0ac31d4499b439d788fe3f4869fd8378cbb48ce44ddd1c5586aa305c5fa3c3b313a82c514cb6967c622df55b7372d210ed4d91d706896c12ac6d63488cf0190b00a8f706bb122bc8d5a3473fa4e87d9800e5f5bf5bc22564eab10e87d0a2b0c490df688c31c1174c24853259f8aadaa6311f80ac08d4cfae01ef5bde1c5ecb4adde49362d96ffa6ccc5a68b58aca8ced0c0e3e3f3b10951905f5d445e2e47ba43d55acdcba89d94a0cebcd759c5e58e573f6aced5a26c80da965d3b80a3134ccb19404584c95c11f136f63b2981ab7f7d54ba63ad01bc31eee224d6f64cbcf4881391d0e707a9e7c9ea343206d2a8076a10fdf0c39bf22399267b2a3f58441c7807e0c1c63a545c8688392d42e6b0f56f6da4bff102201da1e34d4751ed7cfa8c21a0790d5b0046df84b3fbb34e9e7fa79a944ab93d178f8f3a57c9a512315c8d46ae3c2686b186027a322fd8fa5ec16eaf43ebb85b3ab81e1a673dd33453d16634626d16100382283a02ece998bfea5105f3848d890c73f0e00451b4fbb112bbc8c82a30aac632873b9c1c8d48fb21e1a53a5173a33dfd3e802753ef3784be9fb86807b0df2f4ebe709f4349a68c8fece99f2f3bea9843d79881ff2ad59afbbe78bc38761e17ddbe5e280117f632ec7f2b58994ef08883634155b368fdc94ea7583a83a329ffec08ebaf5a3bd79ad36427d7d25d309c24d6c0c60baa960136847081c407d38bd3a10e6296205ac1e06cd1ff906c47740c13d064a0151cd9b6332a395bb9dacac551ba8ba640067703907855db1206c2d8f05471caeb023dd11ae5c2a4e6406e29a752126d55e19c6ed8566281e6770a4359d66825f1103a0f6ea0848d87fcf8b348010eeeddab6bdf8cae03a74ae7d55bedcb3fc7e725d4f124d3cb074ff7f0d395cf35bc88e11cc0e795e63993c76cf0f85e7024ec8fd9ac2b7015a602955fcb00"/4096}, {0x70, 0x10d, 0x10001, "c3d2367efacf581c4e74b2d69ce371634b4d5e5a8c2bbe208ad780fd0db6837dc5c218f8fcb31b09c703aadfcac96185304d96544809ccad5f11cb990e8b3c2d34ad7b904b66300e898392dea8bff5a27bfbc43df3929720d090245975ef"}], 0x21d0}, 0xebd27053d0e283e7) eventfd2(0x1, 0x1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000002840)='/selinux/status\x00', 0x0, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) r6 = syz_open_dev$media(&(0x7f0000002900)='/dev/media#\x00', 0x2, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000002940)={0xffff, 0x3, 0x81, 'queue1\x00', 0x1ff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000002880)={0x80, 0x8001, 0x8010659cd1ceb0c8, 0x1ff, 0x1, 0x1, 0x132, 0xfff, r5}, &(0x7f00000028c0)=0x20) 17:06:11 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:11 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 570.653273] kauditd_printk_skb: 13 callbacks suppressed [ 570.653279] audit: type=1400 audit(1568826371.140:3868): avc: denied { map } for pid=24750 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:11 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 570.711451] audit: type=1400 audit(1568826371.160:3869): avc: denied { map } for pid=24753 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 570.727541] ptrace attach of "/root/syz-executor.2"[24766] was attempted by "/root/syz-executor.2"[24767] 17:06:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x4) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000040)=0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) [ 570.766485] audit: type=1400 audit(1568826371.190:3870): avc: denied { map } for pid=24761 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:11 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 570.874323] audit: type=1400 audit(1568826371.260:3871): avc: denied { map } for pid=24769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000040)) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000011000100000000000000000007000000", @ANYRES32, @ANYBLOB="00000000000000000c001a0004d01ff3f405000000fba8a32a4c00160004000000f81e01ff95d794721beac4c7a175552ae36e13c00fb84a30d14034db974deac5a88dcbe1fe0143dcdb313b8154bb5049de30e97f308559a3036ced0b6583aa16efe03dfe6b49492ffbc3db7f28137c88c1170415129b90e47d79fef1dd9b1ba2"], 0x2c}}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)) [ 570.932585] audit: type=1400 audit(1568826371.330:3872): avc: denied { map } for pid=24774 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:11 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x8005, &(0x7f0000000080)={0xa, 0x400000004e21, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000000040)=0x8200001000000505, 0x39c77fec327277cd) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002980)="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", 0x56b}], 0x1}}], 0x1, 0x0) [ 570.966500] audit: type=1400 audit(1568826371.360:3873): avc: denied { map } for pid=24777 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 570.999996] audit: type=1400 audit(1568826371.430:3874): avc: denied { map } for pid=24780 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 571.027492] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 571.042978] audit: type=1400 audit(1568826371.540:3875): avc: denied { map } for pid=24786 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 571.087001] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 571.147547] audit: type=1400 audit(1568826371.640:3876): avc: denied { map } for pid=24792 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 571.506934] audit: type=1400 audit(1568826372.000:3877): avc: denied { map } for pid=24793 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:14 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x20000000014) 17:06:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:06:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x200) 17:06:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) fallocate(r0, 0x10, 0xee, 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:14 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x200}) 17:06:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, 0x0, &(0x7f0000000040)) 17:06:14 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_getscheduler(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 17:06:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) eventfd2(0x1000, 0x80001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, 0x0, &(0x7f0000000040)) 17:06:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0x7, 0xfffffffffffffffc, 0x20, 0x80000, 0xffffffffffffffff}) fsetxattr(r3, &(0x7f0000000040)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/dev/net/tun\x00', 0xd, 0x1) 17:06:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x20000000014) 17:06:17 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, 0x0, &(0x7f0000000040)) 17:06:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:17 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)={0x3, 0x5a, 0x16, 0x3ff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") flistxattr(r2, &(0x7f00000000c0)=""/150, 0x96) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000240)={0x6, 0x6316}) 17:06:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 576.751525] kauditd_printk_skb: 11 callbacks suppressed [ 576.751534] audit: type=1400 audit(1568826377.250:3889): avc: denied { map } for pid=24840 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:17 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) [ 576.804264] audit: type=1400 audit(1568826377.300:3890): avc: denied { map } for pid=24846 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 576.836871] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:17 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x0) 17:06:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 576.858770] audit: type=1400 audit(1568826377.330:3891): avc: denied { map } for pid=24851 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:17 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x0) 17:06:17 executing program 5: getresuid(&(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xfffffffffffffff8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffff, 0x4, &(0x7f00000002c0)=[{&(0x7f00000000c0)="3465a505d9b1a313e33933b78299876e86722a14845a8edb969aabde", 0x1c, 0x6}, {&(0x7f0000000100)="26200fb0ed22f0ec397963b6503bfce3e5bbfc03766b3e2f31b7ff38add483544764bfc7f603", 0x26, 0x5}, {&(0x7f0000000140)="7d93e5a0616640a12010e266a6de033e3ce862e33f473d8779107d04e67ba8e67313cba007c84fe1a1969be2a27b08", 0x2f, 0x7}, {&(0x7f0000000180)="dbdda0be828d1ed77a7d2cea3d3c5bcc1f47d0c3c4a0d0dd657f9c5a1509fe820a71dfda23eed9949b6afaa82bb170e50f1bd6d6b74e06a0fa8a6ed7c80353f9822813682d81724da800facf5a8cf6d28bc93e71103e6af2c401039fabfac014d63a68b3e2510365cacbdc568fa558f29f2fa2a9aedb34efad1870b48b59bd15745a4d6b52f4d2e0d51c999ecbbbcfdff318e7b6047bcec9be423a560516019e89", 0xa1, 0xed92}], 0x2050094, &(0x7f0000000500)={[{@case_sensitive_yes='case_sensitive=yes'}, {@umask={'umask', 0x3d, 0x60000}}, {@disable_sparse_yes='disable_sparse=yes'}, {@dmask={'dmask', 0x3d, 0x1}}], [{@uid_eq={'uid', 0x3d, r0}}, {@fowner_gt={'fowner>', r1}}, {@obj_type={'obj_type', 0x3d, 'veth1_to_team\x00'}}, {@dont_measure='dont_measure'}, {@smackfsroot={'smackfsroot', 0x3d, '\'$.$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x0, 0xd54647d5afe0dd68) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x5, 0x1b37, 0x0, "b8bdb8e20ee72f9c1019fa490d0204dd37231ce8cb5b496b0516a79bac9ef2fe4eaf20a9183de5ba4d4f30cf871e05fc9c9f2981afafee9758297159c364ca"}, 0x60) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000003c0)=0x1f) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000440)) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) [ 576.933286] audit: type=1400 audit(1568826377.340:3892): avc: denied { map } for pid=24856 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:17 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x0) [ 576.998400] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 577.013821] audit: type=1400 audit(1568826377.410:3893): avc: denied { map } for pid=24862 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 577.069748] audit: type=1400 audit(1568826377.410:3894): avc: denied { map } for pid=24860 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 577.106897] audit: type=1400 audit(1568826377.490:3895): avc: denied { map } for pid=24874 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 577.129982] audit: type=1400 audit(1568826377.500:3897): avc: denied { map } for pid=24873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 577.155281] audit: type=1400 audit(1568826377.500:3896): avc: denied { map } for pid=24870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 577.179266] audit: type=1400 audit(1568826377.550:3898): avc: denied { map } for pid=24881 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x20000000014) 17:06:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IMGETVERSION(r1, 0x80044942, 0x0) 17:06:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000040)=r2) 17:06:20 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:20 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[0x0, &(0x7f0000000740)='!\xff']) [ 579.885898] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 579.961416] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 580.022372] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 580.050625] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x20000000014) 17:06:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:23 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/\x00', 0x258c01, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 582.863905] kauditd_printk_skb: 21 callbacks suppressed [ 582.863913] audit: type=1400 audit(1568826383.360:3920): avc: denied { map } for pid=24947 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 582.931895] audit: type=1400 audit(1568826383.430:3921): avc: denied { map } for pid=24958 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x584785b7dac847a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_team\x00'}) 17:06:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 582.971863] audit: type=1400 audit(1568826383.450:3922): avc: denied { map } for pid=24959 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 583.009417] audit: type=1400 audit(1568826383.500:3923): avc: denied { map } for pid=24960 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 583.056141] audit: type=1400 audit(1568826383.530:3924): avc: denied { map } for pid=24970 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 583.099773] audit: type=1400 audit(1568826383.590:3925): avc: denied { map } for pid=24973 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 583.134298] audit: type=1400 audit(1568826383.620:3926): avc: denied { map } for pid=24976 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 583.192618] audit: type=1400 audit(1568826383.660:3927): avc: denied { map } for pid=24978 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 583.216422] audit: type=1400 audit(1568826383.710:3928): avc: denied { map } for pid=24984 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 583.239900] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 583.287922] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 583.313616] audit: type=1400 audit(1568826383.780:3929): avc: denied { map } for pid=24990 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:26 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x20000000014) 17:06:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r1, &(0x7f0000000000), r0, &(0x7f0000000040), 0x9, 0x4) 17:06:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:26 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x200000, 0x40) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) 17:06:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) [ 585.997847] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x40000000004, 0x9, 0x0, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x3c) 17:06:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:26 executing program 5: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x6200, 0x0) [ 586.078289] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 586.157231] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:27 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x20000000014) 17:06:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@local}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000001300)={@loopback, @loopback}, 0x0) 17:06:27 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 586.865633] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 586.907664] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 17:06:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@local}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000001300)={@loopback, @loopback}, 0x0) 17:06:29 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:29 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x20000000014) [ 589.034048] kauditd_printk_skb: 23 callbacks suppressed [ 589.034056] audit: type=1400 audit(1568826389.530:3953): avc: denied { map } for pid=25067 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 589.073345] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 589.085636] audit: type=1400 audit(1568826389.570:3954): avc: denied { map } for pid=25076 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 589.116087] audit: type=1400 audit(1568826389.610:3955): avc: denied { map } for pid=25078 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 589.155015] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:29 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:29 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 589.224268] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 589.261933] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:29 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:29 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 589.296454] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 589.332825] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 589.363639] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 589.468273] audit: type=1400 audit(1568826389.960:3956): avc: denied { map } for pid=25100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 589.868407] audit: type=1400 audit(1568826390.360:3957): avc: denied { map } for pid=25101 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 589.899106] audit: type=1400 audit(1568826390.390:3958): avc: denied { map } for pid=25102 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 589.930006] audit: type=1400 audit(1568826390.420:3959): avc: denied { map } for pid=25103 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:32 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@local}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000001300)={@loopback, @loopback}, 0x0) 17:06:32 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 17:06:32 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x0) 17:06:32 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 592.068208] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 592.081823] audit: type=1400 audit(1568826392.580:3960): avc: denied { map } for pid=25109 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:32 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 592.125657] audit: type=1400 audit(1568826392.590:3961): avc: denied { map } for pid=25117 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 592.155727] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:32 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 592.187548] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:32 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 592.481811] audit: type=1400 audit(1568826392.980:3962): avc: denied { map } for pid=25141 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) 17:06:35 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:35 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x0) [ 595.088152] net_ratelimit: 4 callbacks suppressed [ 595.088157] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 595.105955] kauditd_printk_skb: 3 callbacks suppressed [ 595.105964] audit: type=1804 audit(1568826395.600:3966): pid=25155 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir186803633/syzkaller.KVhSxJ/766/bus" dev="sda1" ino=17231 res=1 17:06:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 595.182789] audit: type=1400 audit(1568826395.600:3967): avc: denied { map } for pid=25156 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 595.201865] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:35 executing program 1: sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:06:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 595.295952] audit: type=1400 audit(1568826395.640:3968): avc: denied { map } for pid=25152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 595.314069] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 595.369090] audit: type=1400 audit(1568826395.730:3969): avc: denied { map } for pid=25166 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 595.371978] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 595.395981] audit: type=1400 audit(1568826395.790:3970): avc: denied { map } for pid=25170 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 595.422874] audit: type=1400 audit(1568826395.840:3971): avc: denied { map } for pid=25176 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 595.445384] audit: type=1804 audit(1568826395.930:3972): pid=25161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir186803633/syzkaller.KVhSxJ/766/bus" dev="sda1" ino=17231 res=1 [ 595.482106] audit: type=1400 audit(1568826395.980:3973): avc: denied { map } for pid=25184 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 595.917784] audit: type=1400 audit(1568826396.410:3974): avc: denied { map } for pid=25185 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 595.983750] audit: type=1400 audit(1568826396.480:3975): avc: denied { map } for pid=25186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) pipe(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000240)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000d40)={@dev}, &(0x7f0000000d80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@local}}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000012c0)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000001300)={@loopback, @loopback}, &(0x7f0000001340)=0xc) 17:06:38 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:38 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x0) 17:06:38 executing program 1: sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:06:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 598.123163] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 598.209284] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 598.253200] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 598.304444] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 598.332264] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 598.372746] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) pipe(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000240)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000d40)={@dev}, &(0x7f0000000d80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@local}}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000012c0)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000001300)={@loopback, @loopback}, &(0x7f0000001340)=0xc) 17:06:41 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:41 executing program 1: sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:06:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) pipe(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000240)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000d40)={@dev}, &(0x7f0000000d80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@local}}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000012c0)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000001300)={@loopback, @loopback}, &(0x7f0000001340)=0xc) [ 601.149049] kauditd_printk_skb: 7 callbacks suppressed [ 601.149057] audit: type=1400 audit(1568826401.640:3983): avc: denied { map } for pid=25236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 601.198259] net_ratelimit: 1 callbacks suppressed [ 601.198264] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 601.271628] audit: type=1400 audit(1568826401.690:3984): avc: denied { map } for pid=25244 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 601.313473] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 601.398397] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) 17:06:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 601.480679] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 601.518435] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 601.564010] audit: type=1400 audit(1568826402.060:3985): avc: denied { map } for pid=25263 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 601.625654] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 601.656202] audit: type=1804 audit(1568826402.060:3986): pid=25266 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir074836201/syzkaller.MzLXER/699/bus" dev="sda1" ino=17293 res=1 [ 601.726419] audit: type=1804 audit(1568826402.210:3987): pid=25266 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir074836201/syzkaller.MzLXER/699/bus" dev="sda1" ino=17293 res=1 [ 601.753710] audit: type=1400 audit(1568826402.220:3988): avc: denied { map } for pid=25271 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 601.782503] audit: type=1400 audit(1568826402.280:3989): avc: denied { map } for pid=25272 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 601.969982] audit: type=1400 audit(1568826402.460:3990): avc: denied { map } for pid=25273 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 601.992140] audit: type=1400 audit(1568826402.460:3991): avc: denied { map } for pid=25274 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) pipe(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000240)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000d40)={@dev}, &(0x7f0000000d80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@loopback, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@local}}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000012c0)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000001300)={@loopback, @loopback}, &(0x7f0000001340)=0xc) 17:06:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:44 executing program 0: msgsnd(0x0, &(0x7f0000000080)={0x3}, 0x8, 0x0) 17:06:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:44 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:44 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 604.191016] audit: type=1400 audit(1568826404.690:3992): avc: denied { map } for pid=25280 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$kcm(0xa, 0x2, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000100), &(0x7f0000000140)=0x10) 17:06:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 604.233007] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:44 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x4000, 0x0) [ 604.317750] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:44 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x4000, 0x0) 17:06:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0xc208ae62, &(0x7f0000000180)) 17:06:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) accept(r1, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:47 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x4000, 0x0) 17:06:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) syz_open_pts(r0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) pipe(&(0x7f0000000480)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0), 0x0) 17:06:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:47 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 607.247298] kauditd_printk_skb: 13 callbacks suppressed [ 607.247306] audit: type=1400 audit(1568826407.740:4006): avc: denied { map } for pid=25328 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$kcm(0xa, 0x2, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x10) 17:06:47 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x4000, 0x0) 17:06:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) [ 607.295298] audit: type=1400 audit(1568826407.750:4007): avc: denied { map } for pid=25336 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 607.324721] audit: type=1400 audit(1568826407.790:4008): avc: denied { map } for pid=25340 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:47 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x4000, 0x0) [ 607.386935] audit: type=1400 audit(1568826407.820:4009): avc: denied { map } for pid=25341 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 607.391878] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:47 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x4000, 0x0) [ 607.426250] audit: type=1400 audit(1568826407.880:4010): avc: denied { map } for pid=25352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 607.463033] audit: type=1400 audit(1568826407.910:4011): avc: denied { map } for pid=25354 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 607.485911] audit: type=1400 audit(1568826407.960:4012): avc: denied { map } for pid=25360 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 607.508174] audit: type=1400 audit(1568826407.990:4013): avc: denied { map } for pid=25363 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 607.627555] audit: type=1400 audit(1568826408.120:4014): avc: denied { map } for pid=25365 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 608.076383] audit: type=1400 audit(1568826408.570:4015): avc: denied { map } for pid=25366 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:50 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x4000, 0x0) 17:06:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:50 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:50 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x0, 0x0) 17:06:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:50 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x0, 0x0) 17:06:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 610.338301] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 610.377467] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 17:06:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:50 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x0, 0x0) 17:06:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 17:06:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) 17:06:51 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000000a060501ff0080fffd090000ab0005610c000100060000007d0a00010c0002"], 0x23}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:06:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:06:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) 17:06:51 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) 17:06:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote}, 0x20) 17:06:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote}, 0x20) 17:06:53 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 17:06:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:06:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:53 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x32d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) 17:06:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote}, 0x20) [ 613.468409] kauditd_printk_skb: 18 callbacks suppressed [ 613.468417] audit: type=1400 audit(1568826413.960:4034): avc: denied { map } for pid=25450 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x32d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) [ 613.525801] audit: type=1400 audit(1568826413.970:4035): avc: denied { create } for pid=25451 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 613.526658] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 613.656389] audit: type=1400 audit(1568826413.970:4036): avc: denied { create } for pid=25451 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 613.736889] audit: type=1400 audit(1568826414.020:4037): avc: denied { map } for pid=25460 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 613.762070] audit: type=1400 audit(1568826414.060:4038): avc: denied { map } for pid=25461 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:54 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)='A', 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x84, 0x1e, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0}, 0x20) 17:06:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) [ 613.785321] audit: type=1400 audit(1568826414.120:4039): avc: denied { map } for pid=25469 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x32d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) [ 613.862138] audit: type=1400 audit(1568826414.360:4040): avc: denied { map } for pid=25477 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:54 executing program 2: unshare(0x20020000) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xadcb) open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) [ 613.898099] audit: type=1400 audit(1568826414.360:4041): avc: denied { map } for pid=25478 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:54 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) [ 614.038771] audit: type=1400 audit(1568826414.530:4042): avc: denied { map } for pid=25489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 614.118641] audit: type=1400 audit(1568826414.610:4043): avc: denied { map } for pid=25492 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:06:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:56 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 17:06:56 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:06:56 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:56 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 17:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) [ 616.512517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:06:57 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:06:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:06:57 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) 17:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:06:57 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:06:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:06:57 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(0xffffffffffffffff, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:06:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:06:57 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:06:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:00 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:00 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(0xffffffffffffffff, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:00 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) [ 619.665762] kauditd_printk_skb: 22 callbacks suppressed [ 619.665771] audit: type=1400 audit(1568826420.160:4066): avc: denied { map } for pid=25570 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:00 executing program 0: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:00 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 619.700533] audit: type=1400 audit(1568826420.170:4067): avc: denied { map } for pid=25575 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) [ 619.778440] audit: type=1400 audit(1568826420.270:4068): avc: denied { map } for pid=25581 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:00 executing program 0: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 619.823713] audit: type=1400 audit(1568826420.290:4069): avc: denied { map } for pid=25583 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:00 executing program 0: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 619.874908] audit: type=1400 audit(1568826420.310:4070): avc: denied { map } for pid=25585 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 619.931610] audit: type=1400 audit(1568826420.350:4071): avc: denied { map } for pid=25591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 619.979098] audit: type=1400 audit(1568826420.430:4072): avc: denied { map } for pid=25596 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 620.001924] audit: type=1400 audit(1568826420.430:4073): avc: denied { map } for pid=25595 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 620.025254] audit: type=1400 audit(1568826420.460:4074): avc: denied { map } for pid=25598 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 620.047578] audit: type=1400 audit(1568826420.530:4075): avc: denied { map } for pid=25602 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:03 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:03 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:03 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(0xffffffffffffffff, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:03 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:03 executing program 2: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:03 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:03 executing program 2: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:03 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:04 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:04 executing program 2: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:04 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:04 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:04 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:04 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:06 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:06 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 625.948522] kauditd_printk_skb: 32 callbacks suppressed [ 625.948529] audit: type=1400 audit(1568826426.440:4108): avc: denied { map } for pid=25697 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:06 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:06 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 626.005080] audit: type=1400 audit(1568826426.490:4109): avc: denied { map } for pid=25707 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 626.032857] audit: type=1400 audit(1568826426.490:4110): avc: denied { map } for pid=25706 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:06 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 626.069318] audit: type=1400 audit(1568826426.560:4111): avc: denied { map } for pid=25715 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 626.148020] audit: type=1400 audit(1568826426.640:4112): avc: denied { map } for pid=25724 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 626.173794] audit: type=1400 audit(1568826426.650:4113): avc: denied { map } for pid=25723 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 626.768706] audit: type=1400 audit(1568826427.260:4114): avc: denied { map } for pid=25725 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 626.799773] audit: type=1400 audit(1568826427.290:4115): avc: denied { map } for pid=25726 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:09 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:09 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:09 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 628.989148] audit: type=1400 audit(1568826429.480:4116): avc: denied { map } for pid=25732 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:09 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:09 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:09 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 629.025911] audit: type=1400 audit(1568826429.510:4117): avc: denied { map } for pid=25739 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:09 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:09 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:12 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:12 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 632.032236] kauditd_printk_skb: 7 callbacks suppressed [ 632.032243] audit: type=1400 audit(1568826432.520:4125): avc: denied { map } for pid=25768 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 632.083483] audit: type=1400 audit(1568826432.570:4126): avc: denied { map } for pid=25775 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:12 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 632.134377] audit: type=1400 audit(1568826432.630:4127): avc: denied { map } for pid=25780 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 632.179804] audit: type=1400 audit(1568826432.630:4128): avc: denied { map } for pid=25779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 632.227900] audit: type=1400 audit(1568826432.670:4129): avc: denied { map } for pid=25786 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 17:07:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 17:07:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 17:07:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 632.264567] audit: type=1400 audit(1568826432.750:4130): avc: denied { map } for pid=25794 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 632.369154] audit: type=1400 audit(1568826432.860:4131): avc: denied { map } for pid=25807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 632.404451] audit: type=1400 audit(1568826432.860:4132): avc: denied { map } for pid=25808 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 632.429404] audit: type=1400 audit(1568826432.880:4133): avc: denied { map } for pid=25811 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 632.452936] audit: type=1400 audit(1568826432.900:4134): avc: denied { map } for pid=25812 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:13 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:13 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:13 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 17:07:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:13 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 17:07:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:13 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 632.916889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:07:13 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:14 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:14 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 17:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:14 executing program 4: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:14 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:14 executing program 4: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:14 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) [ 633.765063] ptrace attach of "/root/syz-executor.4"[25861] was attempted by "/root/syz-executor.4"[25865] [ 633.778006] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:07:14 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x10, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:14 executing program 4: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:14 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) [ 633.849487] ptrace attach of "/root/syz-executor.4"[25875] was attempted by "/root/syz-executor.4"[25876] [ 633.969733] ptrace attach of "/root/syz-executor.4"[25887] was attempted by "/root/syz-executor.4"[25888] 17:07:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:15 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x10, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:15 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 17:07:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:15 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="ce62e012c2a20030d511bc737e7bb9e4c08e14b6cfd305d6ae6049af4328a7706d24e1de82c983655da352b314b2b0310e3a020f550f07c8142a632a7a0e045500097b", 0x43}], 0x1}, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x18d, 0x0) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 17:07:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f00000001c0)) [ 634.651236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 634.682269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41666 sclass=netlink_route_socket pig=25909 comm=syz-executor.0 17:07:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:15 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x10, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd7978", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:15 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 634.928321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25932 comm=syz-executor.0 17:07:15 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:15 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:16 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, 0xffffffffffffffff, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 635.521926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:07:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") socketpair(0xf, 0x3, 0x2, &(0x7f0000000000)) 17:07:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:16 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r0, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r0, 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:16 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(0x0, 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0x0, 0x3, 0x2, &(0x7f0000000000)) 17:07:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0x0, 0x3, 0x2, &(0x7f0000000000)) 17:07:16 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r0, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r0, 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:16 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(0x0, 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:17 executing program 3: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x34d) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r0, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r0, 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 637.174806] kauditd_printk_skb: 56 callbacks suppressed [ 637.174815] audit: type=1400 audit(1568826437.670:4191): avc: denied { map } for pid=26022 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0x0, 0x3, 0x2, &(0x7f0000000000)) 17:07:19 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(0x0, 0x3, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x0, 0x2, &(0x7f0000000000)) [ 638.730761] audit: type=1400 audit(1568826439.230:4192): avc: denied { map } for pid=26028 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 638.736802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:07:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:19 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x0, 0x2, &(0x7f0000000000)) [ 638.811669] audit: type=1400 audit(1568826439.230:4193): avc: denied { map } for pid=26032 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 638.867325] audit: type=1400 audit(1568826439.280:4194): avc: denied { map } for pid=26038 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x0, 0x2, &(0x7f0000000000)) [ 638.901226] audit: type=1400 audit(1568826439.360:4195): avc: denied { map } for pid=26044 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 638.927622] audit: type=1400 audit(1568826439.390:4196): avc: denied { map } for pid=26045 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x0, &(0x7f0000000000)) [ 638.981927] audit: type=1400 audit(1568826439.470:4197): avc: denied { map } for pid=26052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 639.036579] audit: type=1400 audit(1568826439.530:4198): avc: denied { map } for pid=26055 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 639.066421] audit: type=1400 audit(1568826439.560:4199): avc: denied { map } for pid=26057 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 639.558460] audit: type=1400 audit(1568826440.050:4200): avc: denied { map } for pid=26060 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x0, &(0x7f0000000000)) 17:07:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 17:07:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:22 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:07:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x0, &(0x7f0000000000)) 17:07:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair(0xf, 0x3, 0x2, 0x0) 17:07:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:22 executing program 5: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4010aefd, &(0x7f0000000600)={0x0, 0x0, @ioapic={0x0, 0x3267, 0x0, 0x0, 0x0, [{0xc6c1, 0x6}, {0x0, 0xda, 0x8}, {}, {0x0, 0xffffffff80000001}, {0x0, 0x0, 0x5, [], 0x1a0}, {}, {}, {}, {0x0, 0xfffffffffffffc10}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, [], 0x7}, {0x0, 0x0, 0x0, [], 0x4}, {}, {}, {}, {0x6}, {}, {}, {}, {}, {}, {0x4}, {0x3, 0x5, 0x2}]}}) [ 642.586577] kauditd_printk_skb: 10 callbacks suppressed [ 642.586585] audit: type=1400 audit(1568826443.080:4211): avc: denied { map } for pid=26099 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 642.625418] audit: type=1400 audit(1568826443.120:4212): avc: denied { map } for pid=26100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:25 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) add_key(&(0x7f0000000100)='trusted\x00', 0x0, 0x0, 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:25 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 644.807400] audit: type=1400 audit(1568826445.300:4213): avc: denied { map } for pid=26106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 644.927253] audit: type=1400 audit(1568826445.420:4214): avc: denied { map } for pid=26118 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:25 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) add_key(&(0x7f0000000100)='trusted\x00', 0x0, 0x0, 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) [ 645.031559] audit: type=1400 audit(1568826445.530:4215): avc: denied { map } for pid=26123 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 645.082506] audit: type=1400 audit(1568826445.580:4216): avc: denied { map } for pid=26126 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 645.139364] audit: type=1400 audit(1568826445.630:4217): avc: denied { map } for pid=26131 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 645.170826] audit: type=1400 audit(1568826445.670:4218): avc: denied { map } for pid=26133 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 645.213093] audit: type=1400 audit(1568826445.710:4219): avc: denied { map } for pid=26136 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 645.250646] audit: type=1400 audit(1568826445.750:4220): avc: denied { map } for pid=26139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:28 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) add_key(&(0x7f0000000100)='trusted\x00', 0x0, 0x0, 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:28 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, 0x0, 0x0) 17:07:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 647.846284] kauditd_printk_skb: 2 callbacks suppressed [ 647.846292] audit: type=1400 audit(1568826448.340:4223): avc: denied { map } for pid=26145 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:28 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, 0x0, 0x0) 17:07:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 647.918029] audit: type=1400 audit(1568826448.410:4224): avc: denied { map } for pid=26158 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 647.992441] audit: type=1400 audit(1568826448.490:4225): avc: denied { map } for pid=26164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:28 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) futex(&(0x7f00000014c0), 0x3, 0x0, 0x0, 0x0, 0x0) [ 648.055814] audit: type=1400 audit(1568826448.550:4226): avc: denied { map } for pid=26170 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:28 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) add_key(&(0x7f0000000100)='trusted\x00', 0x0, 0x0, 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) [ 648.097111] audit: type=1400 audit(1568826448.580:4227): avc: denied { map } for pid=26168 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 648.151173] audit: type=1400 audit(1568826448.650:4228): avc: denied { map } for pid=26174 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 648.189216] audit: type=1400 audit(1568826448.680:4229): avc: denied { map } for pid=26176 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 648.355090] audit: type=1400 audit(1568826448.850:4230): avc: denied { map } for pid=26178 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 648.678378] audit: type=1400 audit(1568826449.170:4232): avc: denied { map } for pid=26179 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 648.700726] audit: type=1400 audit(1568826449.170:4231): avc: denied { map } for pid=26180 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:31 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:31 executing program 2: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) add_key(&(0x7f0000000100)='trusted\x00', 0x0, 0x0, 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:31 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r2, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 650.950212] protocol 88fb is buggy, dev hsr_slave_0 [ 650.955350] protocol 88fb is buggy, dev hsr_slave_1 17:07:31 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) socket$inet(0x2, 0x2, 0x2000000088) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:31 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:31 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00', 0x0, 0x0) 17:07:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:34 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000280)=@known='trusted.overlay.origin\x00', 0x0, 0x198) 17:07:34 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8}, 0x1c) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:07:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000280)=[{}, {0xfeffff07}, {0x0, '\x00\x04\x00\x00\x00\x00\x00\xff\xff\x00\x00\x00\xf8,/\x14\x00'}]}, 0x108) 17:07:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x87f1a7) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000010b7efa4d3977fee19ea00"/31]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") [ 653.947318] kauditd_printk_skb: 12 callbacks suppressed [ 653.947325] audit: type=1400 audit(1568826454.440:4245): avc: denied { map } for pid=26231 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:34 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) [ 654.096396] audit: type=1400 audit(1568826454.590:4246): avc: denied { map } for pid=26245 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 654.163708] audit: type=1400 audit(1568826454.650:4247): avc: denied { map } for pid=26250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 654.246624] audit: type=1400 audit(1568826454.740:4248): avc: denied { map } for pid=26254 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 654.299100] audit: type=1400 audit(1568826454.790:4249): avc: denied { map } for pid=26262 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 654.336495] audit: type=1400 audit(1568826454.830:4250): avc: denied { map } for pid=26264 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 654.759926] audit: type=1400 audit(1568826455.250:4251): avc: denied { map } for pid=26265 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 654.795857] audit: type=1400 audit(1568826455.290:4252): avc: denied { map } for pid=26266 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:37 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:07:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 657.022648] audit: type=1400 audit(1568826457.520:4253): avc: denied { map } for pid=26271 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:37 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) socket$packet(0x11, 0x3, 0x300) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) [ 657.086782] audit: type=1400 audit(1568826457.580:4254): avc: denied { map } for pid=26280 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:37 executing program 5: pipe2(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xf4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:40 executing program 5: pipe2(0x0, 0x0) socket$inet6(0xa, 0x3, 0xf4) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) 17:07:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:07:40 executing program 5: pipe2(0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) [ 660.092304] kauditd_printk_skb: 9 callbacks suppressed [ 660.092311] audit: type=1400 audit(1568826460.590:4264): avc: denied { map } for pid=26311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:40 executing program 5: sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/148) [ 660.145672] audit: type=1400 audit(1568826460.630:4265): avc: denied { map } for pid=26320 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 660.202552] audit: type=1400 audit(1568826460.700:4266): avc: denied { map } for pid=26328 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:40 executing program 5: sysfs$2(0x2, 0x0, 0x0) [ 660.248726] audit: type=1400 audit(1568826460.740:4267): avc: denied { map } for pid=26333 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:40 executing program 5: sysfs$2(0x2, 0x0, 0x0) 17:07:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 660.288007] audit: type=1400 audit(1568826460.780:4268): avc: denied { map } for pid=26334 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 660.342151] audit: type=1400 audit(1568826460.830:4269): avc: denied { map } for pid=26339 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 660.376132] audit: type=1400 audit(1568826460.870:4270): avc: denied { map } for pid=26343 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 660.426636] audit: type=1400 audit(1568826460.920:4271): avc: denied { map } for pid=26344 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 660.908759] audit: type=1400 audit(1568826461.400:4272): avc: denied { map } for pid=26345 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 660.939187] audit: type=1400 audit(1568826461.430:4273): avc: denied { map } for pid=26346 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:43 executing program 5: sysfs$2(0x2, 0x0, 0x0) 17:07:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) close(r0) 17:07:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) 17:07:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000040", 0x0, 0x103}, 0x28) 17:07:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='errors=continue,mft_zone_multiplier=0xffffffffffffffff,show_sys_files=yes,dmask=0', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 17:07:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 666.163700] kauditd_printk_skb: 10 callbacks suppressed [ 666.163708] audit: type=1400 audit(1568826466.660:4284): avc: denied { map } for pid=26394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) [ 666.236853] ntfs: (device loop2): parse_options(): Invalid dmask option argument: 00xffffffffffffffff18446744073709551615 [ 666.248159] audit: type=1400 audit(1568826466.740:4285): avc: denied { map } for pid=26402 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:07:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 666.274226] audit: type=1400 audit(1568826466.760:4286): avc: denied { map } for pid=26406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 666.369373] audit: type=1400 audit(1568826466.830:4287): avc: denied { map } for pid=26408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) [ 666.398524] audit: type=1400 audit(1568826466.830:4288): avc: denied { map } for pid=26414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) [ 666.459927] audit: type=1400 audit(1568826466.850:4289): avc: denied { map } for pid=26416 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 666.498182] audit: type=1400 audit(1568826466.930:4290): avc: denied { map } for pid=26425 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 666.523070] audit: type=1400 audit(1568826466.990:4291): avc: denied { map } for pid=26428 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 666.585532] audit: type=1400 audit(1568826467.080:4292): avc: denied { map } for pid=26433 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) 17:07:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) 17:07:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) 17:07:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae6", 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:07:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 672.238998] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 672.244212] kauditd_printk_skb: 13 callbacks suppressed [ 672.244219] audit: type=1400 audit(1568826472.740:4306): avc: denied { map } for pid=26479 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) [ 672.348845] audit: type=1400 audit(1568826472.790:4307): avc: denied { map } for pid=26483 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 672.408756] audit: type=1400 audit(1568826472.830:4308): avc: denied { map } for pid=26486 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:07:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:53 executing program 5: socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) [ 672.523796] audit: type=1400 audit(1568826472.940:4309): avc: denied { map } for pid=26489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 672.566562] audit: type=1400 audit(1568826473.000:4310): avc: denied { map } for pid=26495 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 672.589129] audit: type=1400 audit(1568826473.010:4311): avc: denied { map } for pid=26497 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 672.613131] audit: type=1400 audit(1568826473.060:4312): avc: denied { map } for pid=26503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 672.649796] audit: type=1400 audit(1568826473.140:4313): avc: denied { map } for pid=26507 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 672.686993] audit: type=1400 audit(1568826473.180:4314): avc: denied { map } for pid=26508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 673.050074] audit: type=1400 audit(1568826473.540:4315): avc: denied { map } for pid=26509 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae6", 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:55 executing program 5: socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) 17:07:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:07:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:55 executing program 5: socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) 17:07:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:56 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:07:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae6", 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:07:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:58 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:07:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 678.331161] kauditd_printk_skb: 9 callbacks suppressed [ 678.331169] audit: type=1400 audit(1568826478.830:4325): avc: denied { map } for pid=26548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 678.386395] audit: type=1400 audit(1568826478.870:4326): avc: denied { map } for pid=26558 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 678.417541] audit: type=1400 audit(1568826478.910:4327): avc: denied { map } for pid=26559 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:07:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:07:59 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:07:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 678.513389] audit: type=1400 audit(1568826479.010:4328): avc: denied { map } for pid=26563 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:07:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:07:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 678.567898] audit: type=1400 audit(1568826479.050:4329): avc: denied { map } for pid=26567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 678.637892] audit: type=1400 audit(1568826479.130:4330): avc: denied { map } for pid=26576 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 678.666032] audit: type=1400 audit(1568826479.140:4331): avc: denied { map } for pid=26577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 679.149489] audit: type=1400 audit(1568826479.640:4332): avc: denied { map } for pid=26580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1", 0xeb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:01 executing program 5: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 681.387136] audit: type=1400 audit(1568826481.880:4333): avc: denied { map } for pid=26582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 681.424916] audit: type=1400 audit(1568826481.920:4334): avc: denied { map } for pid=26592 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:02 executing program 5: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:02 executing program 5: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1", 0xeb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:04 executing program 5: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 684.408509] kauditd_printk_skb: 10 callbacks suppressed [ 684.408517] audit: type=1400 audit(1568826484.900:4345): avc: denied { map } for pid=26624 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 684.476603] audit: type=1400 audit(1568826484.970:4346): avc: denied { map } for pid=26632 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6991fb054d54a333c28785d630f38ba0ff462a6eb00ea368db25633657b00008eaf3e5a53c644f6917333038571fe000000000000006af8dd1ce4f565d76454f9e2b3da964998113975a6d38f84c1dec32917503563a00c11ed7c0162b399f49dd26ea0d25a5cc147bb951df008a19d36c33a356294ffcfbb0c14024e250c21c0a1f51f0dc5e021079b45c81c1f06635ce516031ee8a289cd2313aa65eb77acfa6b9c2749967a780b02ee5b14f64283bdcf9c271bc09e3f4d227ce71dd1f5365bebe22552312fc0ecb44bc0f1568d1f6cad43581300a4ce8375f068ac5a0a8259a08c773a067c9c6135cf564bbc1f0076", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:05 executing program 5: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 684.511739] audit: type=1400 audit(1568826485.010:4347): avc: denied { map } for pid=26633 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 684.534234] audit: type=1400 audit(1568826485.010:4348): avc: denied { map } for pid=26634 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:05 executing program 5: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) [ 684.614402] audit: type=1400 audit(1568826485.110:4349): avc: denied { map } for pid=26640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 684.703983] audit: type=1400 audit(1568826485.180:4350): avc: denied { map } for pid=26645 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 684.728763] audit: type=1400 audit(1568826485.200:4351): avc: denied { map } for pid=26648 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 684.759493] audit: type=1400 audit(1568826485.220:4352): avc: denied { map } for pid=26652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 684.792985] audit: type=1400 audit(1568826485.290:4353): avc: denied { map } for pid=26655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 684.815721] audit: type=1400 audit(1568826485.290:4354): avc: denied { map } for pid=26654 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1", 0xeb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:07 executing program 5: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6991fb054d54a333c28785d630f38ba0ff462a6eb00ea368db25633657b00008eaf3e5a53c644f6917333038571fe000000000000006af8dd1ce4f565d76454f9e2b3da964998113975a6d38f84c1dec32917503563a00c11ed7c0162b399f49dd26ea0d25a5cc147bb951df008a19d36c33a356294ffcfbb0c14024e250c21c0a1f51f0dc5e021079b45c81c1f06635ce516031ee8a289cd2313aa65eb77acfa6b9c2749967a780b02ee5b14f64283bdcf9c271bc09e3f4d227ce71dd1f5365bebe22552312fc0ecb44bc0f1568d1f6cad43581300a4ce8375f068ac5a0a8259a08c773a067c9c6135cf564bbc1f0076", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:08 executing program 5: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:08 executing program 5: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x112}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:10 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 690.497780] kauditd_printk_skb: 9 callbacks suppressed [ 690.497788] audit: type=1400 audit(1568826490.990:4364): avc: denied { map } for pid=26696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 690.555746] audit: type=1400 audit(1568826491.050:4365): avc: denied { map } for pid=26704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:11 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 690.592416] audit: type=1400 audit(1568826491.090:4366): avc: denied { map } for pid=26705 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:11 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 690.686479] audit: type=1400 audit(1568826491.180:4367): avc: denied { map } for pid=26710 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 690.753497] audit: type=1400 audit(1568826491.240:4368): avc: denied { map } for pid=26717 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 690.789459] audit: type=1400 audit(1568826491.250:4369): avc: denied { map } for pid=26719 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 690.834859] audit: type=1400 audit(1568826491.320:4370): avc: denied { map } for pid=26725 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 690.862696] audit: type=1400 audit(1568826491.360:4371): avc: denied { map } for pid=26726 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 691.354180] audit: type=1400 audit(1568826491.850:4372): avc: denied { map } for pid=26727 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x112}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:14 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 693.536297] audit: type=1400 audit(1568826494.030:4373): avc: denied { map } for pid=26732 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:14 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:14 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) 17:08:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x112}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 696.565979] kauditd_printk_skb: 8 callbacks suppressed [ 696.565987] audit: type=1400 audit(1568826497.060:4382): avc: denied { map } for pid=26769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 696.627257] audit: type=1400 audit(1568826497.120:4383): avc: denied { map } for pid=26777 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 696.649656] audit: type=1400 audit(1568826497.130:4384): avc: denied { map } for pid=26778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) 17:08:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) [ 696.752447] audit: type=1400 audit(1568826497.250:4385): avc: denied { map } for pid=26784 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 696.795361] audit: type=1400 audit(1568826497.290:4386): avc: denied { map } for pid=26789 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 696.855092] audit: type=1400 audit(1568826497.320:4387): avc: denied { map } for pid=26793 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 696.893812] audit: type=1400 audit(1568826497.390:4388): avc: denied { map } for pid=26797 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 696.926893] audit: type=1400 audit(1568826497.420:4389): avc: denied { map } for pid=26798 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 697.367304] audit: type=1400 audit(1568826497.860:4390): avc: denied { map } for pid=26799 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) 17:08:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 699.599769] audit: type=1400 audit(1568826500.090:4391): avc: denied { map } for pid=26805 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b700"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) 17:08:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b700"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) 17:08:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b700"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x20000004e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000540)=0x282, 0xfff3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = dup2(r0, r0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x1c}, 0x1c}}, 0x8000) close(r0) 17:08:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) [ 702.648049] kauditd_printk_skb: 8 callbacks suppressed [ 702.648057] audit: type=1400 audit(1568826503.140:4400): avc: denied { map } for pid=26840 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 702.688680] audit: type=1400 audit(1568826503.180:4401): avc: denied { map } for pid=26846 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 702.812671] audit: type=1400 audit(1568826503.310:4402): avc: denied { map } for pid=26854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6991fb054d54a333c28785d630f38ba0ff462a6eb00ea368db25633657b00008eaf3e5a53c644f6917333038571fe000000000000006af8dd1ce4f565d76454f9e2b3da964998113975a6d38f84c1dec32917503563a00c11ed7c0162b399f49dd26ea0d25a5cc147bb951df008a19d36c33a356294ffcfbb0c14024e250c21c0a1f51f0dc5e021079b45c81c1f06635ce516031ee8a289cd2313aa65eb77acfa6b9c2749967a780b02ee5b14f64283bdcf9c271bc09e3f4d227ce71dd1f5365bebe22552312fc0ecb44bc0f1568d1f6cad43581300a4ce8375f068ac5a0a8259a08c773a067c9c6135cf564bbc1f0076", 0x11a}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 702.867161] audit: type=1400 audit(1568826503.360:4403): avc: denied { map } for pid=26860 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 702.922910] audit: type=1400 audit(1568826503.410:4404): avc: denied { map } for pid=26869 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 703.470994] audit: type=1400 audit(1568826503.970:4405): avc: denied { map } for pid=26873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 703.494153] audit: type=1400 audit(1568826503.970:4406): avc: denied { map } for pid=26874 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!\xc4\xc9\xe1j0PM\xfb\xed\x8a&\'\xdf\x9f\xc3\x00n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r0, r1, 0x0, 0x1) 17:08:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 705.721666] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 705.723971] audit: type=1400 audit(1568826506.220:4407): avc: denied { map } for pid=26879 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 705.785713] audit: type=1400 audit(1568826506.280:4408): avc: denied { map } for pid=26888 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!\xc4\xc9\xe1j0PM\xfb\xed\x8a&\'\xdf\x9f\xc3\x00n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r0, r1, 0x0, 0x1) 17:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 705.849587] audit: type=1400 audit(1568826506.340:4409): avc: denied { map } for pid=26895 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x130}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!\xc4\xc9\xe1j0PM\xfb\xed\x8a&\'\xdf\x9f\xc3\x00n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r0, r1, 0x0, 0x1) 17:08:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 708.720921] kauditd_printk_skb: 5 callbacks suppressed [ 708.720929] audit: type=1400 audit(1568826509.220:4415): avc: denied { map } for pid=26910 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000000000000095000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 708.774845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 708.795844] audit: type=1400 audit(1568826509.260:4416): avc: denied { map } for pid=26914 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd']) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 17:08:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000000000000095000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 708.875874] audit: type=1400 audit(1568826509.370:4417): avc: denied { map } for pid=26926 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000000000000095000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 708.937503] audit: type=1400 audit(1568826509.410:4418): avc: denied { map } for pid=26931 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 708.969881] 9pnet: Insufficient options for proto=fd [ 708.977174] 9pnet: Insufficient options for proto=fd [ 709.016742] audit: type=1400 audit(1568826509.510:4419): avc: denied { map } for pid=26942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 709.044003] audit: type=1400 audit(1568826509.520:4420): avc: denied { map } for pid=26944 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 709.588631] audit: type=1400 audit(1568826510.080:4421): avc: denied { map } for pid=26945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x130}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!\xc4\xc9\xe1j0PM\xfb\xed\x8a&\'\xdf\x9f\xc3\x00n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r0, r1, 0x0, 0x1) 17:08:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 711.783194] audit: type=1400 audit(1568826512.280:4422): avc: denied { map } for pid=26946 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:32 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) [ 711.839194] audit: type=1400 audit(1568826512.330:4423): avc: denied { map } for pid=26951 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 711.910897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 711.935605] audit: type=1400 audit(1568826512.390:4424): avc: denied { map } for pid=26959 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x130}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 714.844436] kauditd_printk_skb: 6 callbacks suppressed [ 714.844443] audit: type=1400 audit(1568826515.340:4431): avc: denied { map } for pid=26984 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 714.908451] audit: type=1400 audit(1568826515.400:4432): avc: denied { map } for pid=26987 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) [ 714.954991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 715.021727] audit: type=1400 audit(1568826515.450:4433): avc: denied { map } for pid=26998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 715.086747] audit: type=1400 audit(1568826515.510:4434): avc: denied { map } for pid=27004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 715.123204] audit: type=1400 audit(1568826515.520:4435): avc: denied { map } for pid=27006 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 715.151042] audit: type=1400 audit(1568826515.570:4436): avc: denied { map } for pid=27013 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 715.173828] audit: type=1400 audit(1568826515.620:4437): avc: denied { map } for pid=27018 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 715.196127] audit: type=1400 audit(1568826515.650:4438): avc: denied { map } for pid=27019 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 715.764008] audit: type=1400 audit(1568826516.260:4439): avc: denied { map } for pid=27020 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200140001000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 17:08:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa) [ 717.946733] audit: type=1400 audit(1568826518.440:4440): avc: denied { map } for pid=27026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200140001000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) [ 717.999962] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 17:08:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200140001000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa) 17:08:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:08:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 17:08:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa) [ 720.995994] kauditd_printk_skb: 9 callbacks suppressed [ 720.996001] audit: type=1400 audit(1568826521.490:4450): avc: denied { map } for pid=27067 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.012435] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xa) [ 721.119005] audit: type=1400 audit(1568826521.570:4451): avc: denied { map } for pid=27076 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 721.202739] audit: type=1400 audit(1568826521.580:4452): avc: denied { map } for pid=27079 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.273022] audit: type=1400 audit(1568826521.590:4453): avc: denied { map } for pid=27078 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.296113] audit: type=1400 audit(1568826521.660:4454): avc: denied { map } for pid=27087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.319233] audit: type=1400 audit(1568826521.670:4455): avc: denied { map } for pid=27088 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.342158] audit: type=1400 audit(1568826521.750:4456): avc: denied { map } for pid=27094 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.364419] audit: type=1400 audit(1568826521.750:4457): avc: denied { map } for pid=27097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.386699] audit: type=1400 audit(1568826521.760:4458): avc: denied { map } for pid=27096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 721.817310] audit: type=1400 audit(1568826522.310:4459): avc: denied { map } for pid=27099 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xa) 17:08:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:08:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x0, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xa) [ 724.045378] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:44 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xa) 17:08:44 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6991fb054d54a333c28785d630f38ba0ff462a6eb00ea368db25633657b00008eaf3e5a53c644f6917333038571fe000000000000006af8dd1ce4f565d76454f9e2b3da964998113975a6d38f84c1dec32917503563a00c11ed7c0162b399f49dd26ea0d25a5cc147bb951df008a19d36c33a356294ffcfbb0c14024e250c21c0a1f51f0dc5e021079b45c81c1f06635ce516031ee8a289cd2313aa65eb77acfa6b9c2749967a780b02ee5b14f64283bdcf9c271bc09e3f4d227ce71dd1f5365bebe22552312fc0ecb44bc0f1568d1f6cad43581300a4ce8375f068ac5a0a8259a08c773a067c9c6135cf564bbc1f0076", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 724.233943] ptrace attach of "/root/syz-executor.1"[27132] was attempted by "/root/syz-executor.1"[27133] 17:08:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:47 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xa) 17:08:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x0, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0xfeffffff00000000, 0x10, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac717fa", 0x0, 0xf000}, 0x28) 17:08:47 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xa) [ 727.091938] kauditd_printk_skb: 10 callbacks suppressed [ 727.091946] audit: type=1400 audit(1568826527.590:4470): avc: denied { map } for pid=27142 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 727.095981] ptrace attach of "/root/syz-executor.1"[27145] was attempted by "/root/syz-executor.1"[27148] [ 727.112704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6991fb054d54a333c28785d630f38ba0ff462a6eb00ea368db25633657b00008eaf3e5a53c644f6917333038571fe000000000000006af8dd1ce4f565d76454f9e2b3da964998113975a6d38f84c1dec32917503563a00c11ed7c0162b399f49dd26ea0d25a5cc147bb951df008a19d36c33a356294ffcfbb0c14024e250c21c0a1f51f0dc5e021079b45c81c1f06635ce516031ee8a289cd2313aa65eb77acfa6b9c2749967a780b02ee5b14f64283bdcf9c271bc09e3f4d227ce71dd1f5365bebe22552312fc0ecb44bc0f1568d1f6cad43581300a4ce8375f068ac5a0a8259a08c773a067c9c6135cf564bbc1f0076", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 727.179109] audit: type=1400 audit(1568826527.670:4471): avc: denied { map } for pid=27151 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 727.189841] ptrace attach of "/root/syz-executor.1"[27155] was attempted by "/root/syz-executor.1"[27156] [ 727.253982] audit: type=1400 audit(1568826527.730:4472): avc: denied { map } for pid=27152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x40) 17:08:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 727.291198] audit: type=1400 audit(1568826527.760:4473): avc: denied { map } for pid=27163 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x40) [ 727.358765] audit: type=1400 audit(1568826527.800:4474): avc: denied { map } for pid=27167 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 727.387995] audit: type=1400 audit(1568826527.850:4475): avc: denied { map } for pid=27176 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 727.495640] audit: type=1400 audit(1568826527.850:4476): avc: denied { map } for pid=27175 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 727.518064] audit: type=1400 audit(1568826527.970:4477): avc: denied { map } for pid=27188 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 727.542289] audit: type=1400 audit(1568826527.970:4478): avc: denied { map } for pid=27187 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 727.564875] audit: type=1400 audit(1568826527.990:4479): avc: denied { map } for pid=27192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x0, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x40) 17:08:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0xf000}, 0x40) [ 727.953019] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x137}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:50 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0xf000}, 0x40) 17:08:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0x1f, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:50 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 730.398879] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0xf000}, 0x40) 17:08:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x8, 0x0, &(0x7f0000000140)="5ae02efc441a8053", 0x0, 0xf000}, 0x40) 17:08:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0x1f, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd79", 0x138}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 733.430821] kauditd_printk_skb: 17 callbacks suppressed [ 733.430829] audit: type=1400 audit(1568826533.930:4497): avc: denied { map } for pid=27265 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 733.471642] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x8, 0x0, &(0x7f0000000140)="5ae02efc441a8053", 0x0, 0xf000}, 0x40) 17:08:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 733.526272] audit: type=1400 audit(1568826534.010:4498): avc: denied { map } for pid=27275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 733.589078] audit: type=1400 audit(1568826534.030:4499): avc: denied { map } for pid=27276 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 733.649694] audit: type=1400 audit(1568826534.130:4500): avc: denied { map } for pid=27283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 733.687519] audit: type=1400 audit(1568826534.130:4502): avc: denied { map } for pid=27284 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 733.725744] audit: type=1400 audit(1568826534.130:4501): avc: denied { map } for pid=27288 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 733.748682] audit: type=1400 audit(1568826534.220:4503): avc: denied { map } for pid=27295 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 733.771124] audit: type=1400 audit(1568826534.220:4504): avc: denied { map } for pid=27297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 734.239323] audit: type=1400 audit(1568826534.730:4505): avc: denied { map } for pid=27298 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x138}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:08:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0x8, 0x0, &(0x7f0000000140)="5ae02efc441a8053", 0x0, 0xf000}, 0x40) 17:08:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:08:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0x1f, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:08:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 736.516078] audit: type=1400 audit(1568826537.010:4506): avc: denied { map } for pid=27304 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:08:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0xc, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d9", 0x0, 0xf000}, 0x40) 17:08:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 736.563971] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:08:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:08:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:08:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0xc, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d9", 0x0, 0xf000}, 0x40) 17:09:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a7e5ae946083f89c0a4b272dfa8c7b9b39630a94050deb366be077733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fbfc53869cb1039b0e9f077377c8077fd25fa42280cee869c3e324d2235d04a159e40d0e43641bf622ecd392c40a2296936dd987c7bd79", 0x138}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:09:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) 17:09:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:09:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0xc, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d9", 0x0, 0xf000}, 0x40) 17:09:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x2d9) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x123) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) 17:09:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xa) [ 739.589555] kauditd_printk_skb: 8 callbacks suppressed [ 739.589564] audit: type=1400 audit(1568826540.080:4515): avc: denied { map } for pid=27340 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:09:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:09:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0xe, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac7", 0x0, 0xf000}, 0x40) [ 739.629915] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:09:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0xfeffffff00000000, 0xe, 0x0, &(0x7f0000000140)="5ae02efc441a80536af0d1d96ac7", 0x0, 0xf000}, 0x40) 17:09:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 739.698979] audit: type=1400 audit(1568826540.190:4516): avc: denied { map } for pid=27354 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 17:09:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001980)=@newqdisc={0x45c, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x430, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x32}}, @TCA_CBQ_RTAB={0x404}]}}]}, 0x45c}}, 0x0) 17:09:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xa) [ 739.734988] audit: type=1400 audit(1568826540.220:4517): avc: denied { map } for pid=27355 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 739.826148] audit: type=1400 audit(1568826540.280:4518): avc: denied { map } for pid=27357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 739.868625] audit: type=1400 audit(1568826540.280:4519): avc: denied { map } for pid=27358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 739.916019] audit: type=1400 audit(1568826540.300:4520): avc: denied { map } for pid=27361 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 739.943416] audit: type=1400 audit(1568826540.390:4521): avc: denied { map } for pid=27369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 739.964749] kasan: CONFIG_KASAN_INLINE enabled [ 739.965611] audit: type=1400 audit(1568826540.420:4522): avc: denied { map } for pid=27370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 739.970456] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 740.001206] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 740.007475] Modules linked in: [ 740.010655] CPU: 1 PID: 27356 Comm: syz-executor.3 Not tainted 4.14.144 #0 [ 740.017644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.026976] task: ffff88808eba0700 task.stack: ffff888061768000 [ 740.033019] RIP: 0010:tcp_push+0xe9/0x610 [ 740.037159] RSP: 0018:ffff88806176fa48 EFLAGS: 00010202 [ 740.042518] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000d86a000 [ 740.049781] RDX: 0000000000000007 RSI: ffffffff85231b30 RDI: 0000000000000038 [ 740.057029] RBP: ffff88806176fa98 R08: ffff8880a0700e9c R09: ffff88808eba0fa0 [ 740.064282] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a0700600 [ 740.071537] R13: 0000000000000000 R14: ffff8880a0700e94 R15: 0000000000000000 [ 740.078802] FS: 00007f1c49f81700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 740.087008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 740.092867] CR2: 0000000021000000 CR3: 0000000060e3f000 CR4: 00000000001406e0 [ 740.100122] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 740.107377] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 740.114623] Call Trace: [ 740.117193] tcp_sendmsg_locked+0x2307/0x3200 [ 740.121680] ? tcp_sendpage+0x60/0x60 [ 740.125461] ? trace_hardirqs_on_caller+0x400/0x590 [ 740.130455] ? trace_hardirqs_on+0xd/0x10 [ 740.134583] tcp_sendmsg+0x30/0x50 [ 740.138120] inet_sendmsg+0x122/0x500 [ 740.141918] ? inet_recvmsg+0x500/0x500 [ 740.145874] sock_sendmsg+0xce/0x110 [ 740.149566] SYSC_sendto+0x206/0x310 [ 740.153257] ? SYSC_connect+0x2d0/0x2d0 [ 740.157235] ? kasan_check_read+0x11/0x20 [ 740.161363] ? _copy_to_user+0x87/0xd0 [ 740.165232] ? put_timespec64+0xb4/0x100 [ 740.169270] ? nsecs_to_jiffies+0x30/0x30 [ 740.173399] ? SyS_clock_gettime+0xf8/0x180 [ 740.177701] SyS_sendto+0x40/0x50 [ 740.181134] ? SyS_getpeername+0x30/0x30 [ 740.185192] do_syscall_64+0x1e8/0x640 [ 740.189073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 740.193897] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 740.199068] RIP: 0033:0x4598e9 [ 740.202248] RSP: 002b:00007f1c49f80c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 740.209938] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 740.217207] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 740.224464] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 000000000000001a [ 740.231714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c49f816d4 [ 740.238961] R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff [ 740.246214] Code: 00 4d 8d 84 24 9c 08 00 00 4c 89 45 b8 e8 c0 c7 39 fc 48 8d 7b 38 4c 8b 45 b8 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 06 0f 8e 1e 04 00 00 48 b8 00 00 00 00 00 [ 740.265321] RIP: tcp_push+0xe9/0x610 RSP: ffff88806176fa48 [ 740.271389] ---[ end trace 0d647332dbe6089a ]--- [ 740.276150] Kernel panic - not syncing: Fatal exception [ 740.282840] Kernel Offset: disabled [ 740.286473] Rebooting in 86400 seconds..