0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x600}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000069658000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x4c00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000200000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x117, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000400)) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000000c0)=0xe600000000000) syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x0, 0x2) [ 2751.284551][ T26] kauditd_printk_skb: 285 callbacks suppressed [ 2751.284566][ T26] audit: type=1400 audit(2000000642.329:103779): avc: denied { prog_load } for pid=307 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x700}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2751.483702][ T26] audit: type=1400 audit(2000000642.349:103780): avc: denied { map } for pid=32767 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001ffffff9e58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2751.680973][ T26] audit: type=1400 audit(2000000642.349:103781): avc: denied { map } for pid=32767 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001007ffff000000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x6800}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2751.916989][ T26] audit: type=1400 audit(2000000642.379:103782): avc: denied { prog_load } for pid=307 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2752.026045][ T322] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=24 sclass=netlink_tcpdiag_socket pig=322 comm=syz-executor.2 [ 2752.042852][ T26] audit: type=1400 audit(2000000642.409:103784): avc: denied { map } for pid=310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3f00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2752.229949][ T26] audit: type=1400 audit(2000000642.409:103785): avc: denied { map } for pid=310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2752.402714][ T26] audit: type=1400 audit(2000000642.379:103783): avc: denied { map } for pid=32767 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2752.572141][ T26] audit: type=1400 audit(2000000642.419:103786): avc: denied { map } for pid=32767 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x6c00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2752.615894][ T360] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2752.636676][ T369] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000ec058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000000f000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0xfffffffffffff3a) 03:44:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7400}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000048000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000e058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8020000, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000040)=""/21, &(0x7f0000000080)=0x15) writev(r0, &(0x7f0000000080), 0x4c) 03:44:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4703}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010002000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001fffffff058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7a00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4800}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010004000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001fffffffe58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:06 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x4, 0x2}, {0x1, 0x5}, 0x1d95, 0x2, 0x8}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000000)={0x9, 0x7e755f7f, 0xffff, 0x4b, 0x3, @discrete={0x4, 0x8}}) r1 = socket$netlink(0x10, 0x3, 0x17) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:44:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7f01}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4c00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000ffff58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2756.308788][ T26] kauditd_printk_skb: 243 callbacks suppressed [ 2756.308804][ T26] audit: type=1400 audit(2000000647.359:104011): avc: denied { map } for pid=691 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x8004}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2756.515411][ T26] audit: type=1400 audit(2000000647.359:104012): avc: denied { map } for pid=691 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2756.692801][ T26] audit: type=1400 audit(2000000647.409:104013): avc: denied { map } for pid=703 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6800}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2756.872165][ T26] audit: type=1400 audit(2000000647.409:104014): avc: denied { map } for pid=703 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010005000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2757.074318][ T26] audit: type=1400 audit(2000000647.409:104015): avc: denied { map } for pid=692 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x4e24, @remote}}) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2757.243668][ T26] audit: type=1400 audit(2000000647.419:104016): avc: denied { map } for pid=692 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100f0ffff58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2757.453556][ T26] audit: type=1400 audit(2000000647.439:104017): avc: denied { map } for pid=703 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xf803}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2757.613645][ T26] audit: type=1400 audit(2000000647.459:104018): avc: denied { map } for pid=691 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2757.732734][ T26] audit: type=1400 audit(2000000647.459:104019): avc: denied { map } for pid=691 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6c00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2757.876642][ T26] audit: type=1400 audit(2000000647.459:104020): avc: denied { map } for pid=703 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040019effffff58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010008000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xff00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7400}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x9}], 0x1) 03:44:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000a000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7a00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xff03}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000140), 0x0) 03:44:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001f0ffffff58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000e000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7f01}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x39c) 03:44:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x1000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001feffffff58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010010000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x8004}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:12 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000300)=0x20, 0x4) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x460801, 0x0) fstat(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000740)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000840)=0xe8) r6 = getuid() fstat(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) r9 = getgid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x1, r6}, {0x2, 0x2, r7}, {0x2, 0x5, r8}], {0x4, 0x7}, [{0x8, 0x1, r9}, {0x8, 0x6, r10}], {0x10, 0x4}, {0x20, 0x1}}, 0x5c, 0x1) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0xb258, 'syz0\x00', @default, 0x0, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{}, {0x0}, {}, {}, {}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000380)={0x0, 0x0, 0xa, 0x0, [], [{0x8, 0x2, 0x7, 0x0, 0xfffffffffffffffc, 0x401}, {0x3, 0xbf18, 0x5, 0x80000001, 0x5b, 0x7}], [[], [], [], [], [], [], [], [], [], []]}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000340)={r11, 0x2}) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x4080, 0x0) [ 2761.321984][ T26] kauditd_printk_skb: 227 callbacks suppressed [ 2761.322000][ T26] audit: type=1400 audit(2000000652.369:104249): avc: denied { map } for pid=1493 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x2000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2761.551319][ T26] audit: type=1400 audit(2000000652.369:104248): avc: denied { map } for pid=1492 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000200000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2761.735667][ T26] audit: type=1400 audit(2000000652.389:104250): avc: denied { map } for pid=1492 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2761.934265][ T26] audit: type=1400 audit(2000000652.409:104251): avc: denied { map } for pid=1492 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xf803}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2762.096823][ T26] audit: type=1400 audit(2000000652.409:104252): avc: denied { map } for pid=1493 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2762.254788][ T26] audit: type=1400 audit(2000000652.419:104253): avc: denied { prog_load } for pid=1494 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2762.369490][ T26] audit: type=1400 audit(2000000652.469:104255): avc: denied { map } for pid=1492 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x3000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001007ffff000000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010020000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2762.533255][ T26] audit: type=1400 audit(2000000652.469:104256): avc: denied { map } for pid=1493 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2762.685164][ T26] audit: type=1400 audit(2000000652.439:104254): avc: denied { map } for pid=1490 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff03}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2762.834295][ T26] audit: type=1400 audit(2000000652.479:104257): avc: denied { map } for pid=1490 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40, 0x0) getpeername(r0, &(0x7f00000001c0)=@ethernet={0x0, @remote}, &(0x7f0000000240)=0x80) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000100)={{0xffffffffffffffff, 0x2, 0x9, 0x1, 0x2dae}, 0x100000001, 0x3}) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="737461bfd6d0636b205dc529aa00000000000000"], 0x14) 03:44:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x4000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010060000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000000f000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x5000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100e0000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000048000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x2000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) fanotify_init(0x0, 0x101000) 03:44:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100f0000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x6000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010002000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010046030058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2766.358865][ T26] kauditd_printk_skb: 235 callbacks suppressed [ 2766.358879][ T26] audit: type=1400 audit(2000000657.409:104493): avc: denied { map } for pid=1963 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010003000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2766.565686][ T26] audit: type=1400 audit(2000000657.409:104494): avc: denied { map } for pid=1915 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1f) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2766.756807][ T26] audit: type=1400 audit(2000000657.409:104495): avc: denied { map } for pid=1940 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2766.922922][ T26] audit: type=1400 audit(2000000657.409:104496): avc: denied { map } for pid=1915 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2767.105910][ T26] audit: type=1400 audit(2000000657.449:104497): avc: denied { map } for pid=1963 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xa000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010047030058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2767.336814][ T26] audit: type=1400 audit(2000000657.459:104498): avc: denied { map } for pid=1940 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010004000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2767.476896][ T26] audit: type=1400 audit(2000000657.459:104499): avc: denied { map } for pid=1940 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2767.487213][ T2016] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2767.528319][ T2006] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2767.534866][ T2006] audit: audit_lost=1268 audit_rate_limit=0 audit_backlog_limit=64 03:44:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x5000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:19 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') syncfs(r0) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x206}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x5, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x1) r2 = socket$netlink(0x10, 0x3, 0x100008000000004) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000200)=0x5, 0x0, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:44:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x3f000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000050058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010005000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000a0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x40000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010008000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10000, 0x0) 03:44:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x47030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000e0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010010000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3f000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100c00e0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x48000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:22 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x300) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x3}) r1 = socket$netlink(0x10, 0x3, 0x10000a000000004) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001700)=ANY=[]) writev(r1, &(0x7f0000001680)=[{&(0x7f0000000280)="ccfa77f0aa6f72006d1f450d46f2293e025c145b197c7355a8b2ee1dd4ac0a73de48ace0dffe72b0ea07f08dce8f515fda8f2b9a1e48f189b8079a74ec1b9b57a728a6220984dd66e7384606b17245c7aea72b2f02e6cafc9ab0c479aa74603cc46324d7c6a81cdba8"}, {&(0x7f0000000300)="a8f0f319674011e2ecaabe86aac2fad61977477441a9020bf01d8931a9c92a3ad0b50acd96e6335e7164274fb08591b1b1b808c2bb5f687137c131a18aeffdc54678f1dcc28f59331588f5b82c8484ae769163b17fdf76523fdf85c819e90ab6781af82509294d8678d5c742cb4fdaff203dc04a828a389f8dc0d9778440f5344445639e"}, {&(0x7f00000003c0)="bf9287333fab78ca95ba1f7c8df9e65fe73366ae9784257f9519f7acba74e63ac6d21240efa668bc9b1b6626c7e3457c50ecdbf4232f6cf1bd4a61d9ad2c6335457dad8c1f4a6dc7a7222546f4b6b9ce026a6773c761f1333fa5dba86087397d91c3912c335f293328fd29767a63cc2f8ce3325758f56a9c8e0aa2b8f1fc87e6b754"}, {&(0x7f0000000480)="e5fba18ea0ce984ac06699"}, {&(0x7f00000004c0)="a4d7a7c7dc63c5c749821282c27b23db621b3ac524d2e9558bb16a22bd513146d75afb5bd5925149bd4d03f43f6bcb30bc7ea2de1f2877c5067bbf4a002f"}, {&(0x7f0000000500)="5c9e72ac122a36c14185bf09d170a97027df25563258e1399e41bd81bb35a5ef5fb484cadc702310e7da21988b175f13a6ad44c84c778b16dbeeb3eeb705451b913a5244f3bd8abbe1f21b2059ee60aecbcf765497c12c56f3499e2600493059ca758cf58ffd5086898969b699e4449444a04bd8498b9dc60dcf6d3218947626e854725492e5c32aea52f94403c63698531a5cffa80a6f45755aff29270036919a52a4377a1b266878d7782748085788000be487703b"}, {&(0x7f00000005c0)="39a967c5b6c63c7a13d6886f1ef22d72d9ec00b8abf8c85cde413bc97e601ef0aab9a5ccff0041495480cbd6452e1d3a589652bf37fb43710abfd47f06b28681b127cc0614e70c64ade462c8186bde6dbbd02cedda2390611e9848c68972ab03ea88cbfaeefadb19f10a6026e862aecf85751bf31f5df5a0e446367c9578e6cc464292cf4d49019d95aa090fc56867d96b48e6043ffbfd"}, {&(0x7f0000000680)="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"}], 0x1) fadvise64(r1, 0xffffffffffffffff, 0x3, 0x7) [ 2771.376818][ T26] kauditd_printk_skb: 271 callbacks suppressed [ 2771.376834][ T26] audit: type=1400 audit(2000000662.429:104756): avc: denied { map } for pid=2371 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010020000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x40000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2771.608208][ T26] audit: type=1400 audit(2000000662.499:104757): avc: denied { map } for pid=2371 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x4c000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2771.766212][ T26] audit: type=1400 audit(2000000662.549:104759): avc: denied { map } for pid=2371 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2771.953880][ T26] audit: type=1400 audit(2000000662.549:104760): avc: denied { map } for pid=2371 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2772.147287][ T26] audit: type=1400 audit(2000000662.549:104758): avc: denied { prog_load } for pid=2373 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100e0000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x47030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2772.332627][ T26] audit: type=1400 audit(2000000662.579:104761): avc: denied { prog_load } for pid=2374 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2772.539327][ T26] audit: type=1400 audit(2000000662.579:104762): avc: denied { prog_load } for pid=2373 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100001f0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2772.658762][ T2573] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2772.665475][ T2573] audit: audit_lost=1274 audit_rate_limit=0 audit_backlog_limit=64 [ 2772.690952][ T2543] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x68000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:24 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x200000, 0x0) sendmmsg$alg(r0, &(0x7f00000024c0)=[{0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=[@assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x48, 0x4000080}, {0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000300)="48867c04cc07a057d8be4471c463fad5b6ae897e8677b66de64fd11e3e13fb2525761942cbe592f88f432c6923e0051868c89403cb072148a919ee2405ac628facfdf51182fa4e0f83377b26de5614faafd73db94bf7397e188fef784329fa43daef5da2fecbe50d3232abc91386fd87d547d4246a", 0x75}, {&(0x7f0000000380)="5919e65831305a75b31ed3e9f635b998b6f730106895a60226838408572b836e66569413ba7e2e1efb355c456519c3a41ea1e881ccaa6f9dc9dd638565328fe927aa10d9d5898fa6f61873c128e4871fae86906920c9bf6f28825e3d32d789", 0x5f}, {&(0x7f0000000400)="037d7d2b69f2b6526696d9c3e1448bb7ad67517e036a6a9bb8f9614313a54e92ea2f8df1c8eaf65b6c", 0x29}, {&(0x7f0000000440)="29c09f0d12ccbd006a92a426904dd618400c121ec2ed7126b97d03cb2c31377dd9979fe8911f27cbd6551b44fe551d990a72b4b6b6611b3ff470037f25016d3e4fc1c82b2c26040864e50e29e24e62f3ad6df4add2dc010c4e685b4c853e", 0x5e}, {&(0x7f00000004c0)="a7da74ccd5a73b14de71ff6e0486b6c288068460789ce034b68e9eac917ce6b661cb5f22721826473b76b0645c34e659d418a46e164a7c465ec2352106095810e84edf2dce8e9fc49cc5a1660e9af1c36ef4d31160b49bfb3e2ba92f29712375c8a2679f7926f78beb9444548feb9e074e4db8b4841f51b5a05d853f9987bc77d878d58966e9e80abcc4f74771e537161490b4e0110178d8905dca7b", 0x9c}], 0x5, &(0x7f0000000600)=[@iv={0xa8, 0x117, 0x2, 0x90, "def8aab393cf866c65e0cd93aa77c1c6139693c6bdbb7f3521dc0d7b1500d1538ae3fc5a3873365b630e267a5687d73a23474729ce2dad7c52d00e23f56ffef567c603144ba3e94a77ac56028926106c71d446637b7dac6c8a2dae55034b862c391f973ffce10416e4ca0bb6c19382f7ab920ae8a26139558a4239e919ae51cb33ed8359a2f99c7f23a277999d2f5f7a"}], 0xa8, 0x4}, {0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000006c0)="6cc2e75783f6dd0b93ca4d6d5f76f635ffef6dfe43d728773e5771f788e39e8c224465d97ffef6a19f9c25e7b123d08500ce99746282cfe1", 0x38}, {&(0x7f0000000700)="a9816c3f09682e4bc4a537bd467ec81c19c653dc23e18d96c40b2bdd2f0ce844e5180705f2213dac8aa8db34b57935adbc7016a16dc050e0dd12855215a0b7cd344239c59fe02708b21bc92647567cb75d862ce301945e0fe50522cffb56076028c32b2989c2f9e7e95b9a138ee88b98c52c389748354c3252379abd90df9754f4dd369944b7429eb52b49c61e7f3d9247cd0e22d2fcd804c696105da5ef2790bef979e4cf421502889058326b88cabad6bff77c7e53e05fd3f48b6207829408c34d12fc1ba42510b5e85ff88ba6e08830", 0xd1}, {&(0x7f0000000800)="1c1aba24db04f1ea8ade70cc59bbc7d143bb3efa929aebb19d4313feac0b67549efa27cb1b9b07057a021838051b68b16f32924b802ac34e2f03fbd7f8f1bce3ef6ec462311e794f62b59512996024151245e897efd5f379bd5ddb76e3a9b4cca7582fd79e4e17d008c7daea48b7ae424b9de9c20353db27b9b419dec4bf2ece09f46f13a7b96917defcda9b0813278969412de5cb5cde9ba485bcf1493280ef21d033df1f006f2bc76ff98c119dbd9562c3dfcfcd7da22a9b898a4ae7c363a2ff2584d5", 0xc4}, {&(0x7f0000000900)="0fd9b513044f034d4343af095419c76863e888eb82c93130d548de68905910679356b2cff488036c73ce4e62035542f380cace85a85366365c74c8fb2799dbf9cc695fed4303ad30cd4f4ac91027268b1e24a975afc93bbfddb60ec6f4bb251de25c304efca00d45bcdee13410e4c9edd338678671daffb7e8d512a92be9b0893d09b32c1b52aee5f450b1561be528fb84e32d0202720f565a1501b2e6dbc6fe6ab814ced3fec64840efebbd09569c44b970a4ecc19c6b8834421a375d248622bcb17885c35f31fe3737373f34b8de77b095a619f4625bef4a6bf7d8f2f0f73a0da88dcaa209503772115f7d", 0xec}, {&(0x7f0000000a00)="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", 0xfb}], 0x5, &(0x7f0000000b80)=[@assoc={0x18, 0x117, 0x4, 0xed}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8}], 0x48, 0x20004080}, {0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000c00)="74a810bd7a896ce4321b7ebbf092f7f239d5f05a2a313141f17583b205509004878a4b37d83ce976e13245c6e47d8acb21e5535a1feb65756e5b32de56fd7988", 0xfffffecf}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000001c40)="db3391d911775e26091568f641da57c65d6537b421562d53fbbcf8058bec2620b20aa53f0c8996758b536a5766b0cb270b8223f0f151f08bc98c87ce6639f24e15bcc9142e8199b57fc72a24b4eec91d43441b8c470ebb0b7c94ee2ac67c61ff1074dd0e5d3b0146524e7e38249dbeb0add3cf4b81acf3da5606f327350081827c273a420afab19e2ae4b54eaf10a5c9bd38e2dd2a29ddc9a60985d71d474e4c41574ab186d51b9bc5c3002f3f3ca390a646a69161323f3b074a82491614de10381c45291d35af0a52e152c94519fe86269c70d449969c205356aa", 0xdb}], 0x3, &(0x7f0000001d80)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18}, @op={0x18}, @iv={0xd8, 0x117, 0x2, 0xbf, "ee420f31c4570a38e152c70776894f3cfb882afbd1bcb41a17b84c8ccd490a85e8a49a7a247f986ad3c29a9af9aea80872c06289d29458c673f824ec7f9c05b481b83a38ed2f268d6fafab22cae182c6f706c728643f0ce25178c639ee27b0386361eb97372c532f4f00edc848f0e01697ab964c4811d7e4a2a7cb4e1bee39c8d114b44bb9d88815a6d72a298a223f4f6131d265dc820fd834a2ba741228658addd3ed33d0f65ec7684be7733f7c0b42fae291f6aa39186a176045152435a4"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x48, 0x117, 0x2, 0x31, "6ebb3eccb60ed134f77e12fee305c2a25e39e0638f8476b7ff91a018825bce565bc861a8cb68744adaaff371752d8ea4ab"}, @iv={0xb8, 0x117, 0x2, 0x9f, "e7f626b682b29b9ba4bb26faea0f1420478ee5a2789875ae5791a61ef11530672dcd2855e8c8266c8271fbebc75689a5f2e000e9bc72c5904f3470b5013e0f28be332ef9958638470e31637874e98c5d6e68dd4aff9c8b96105984bb7e64ade6ede8b8ad767963e7cd7483be29ccc79214c95a411174d84abd4042bb2691da448fa65617cab801c4a044ced0ea2d93f26ecef9de07de9d4bc0452bf36c0d87"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x68, 0x117, 0x2, 0x53, "83c2f0a60e97a69bdbacc227e42e9f0b5586e950bd88ec1d39b19182c127cf42f04c0126ce0694dedca71434aa827b6386bc75bfb8b86a9359fc7c64e2a080792a06d83a0cb5ca943961e50babb1f90a8b52b7"}], 0x2d0, 0x44051}, {0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000002080)="1b36137cc96973ec294d71680887b7376a7e272a294cb7b1edd58b34d9cbb4e95edb2968072a0e7865e96d7e05fdd576d4534db50c70882b197c70", 0x3b}, {&(0x7f00000020c0)="62b0a28b1ad0c1f342", 0x9}, {&(0x7f0000002100)="51028f5d36204666ddc1f76905d42728cb8d0fce4fed1a91660e466b246f3c25b335a17535a4818e9a77765995dc1f4f43e6aceefcc956ab157ec02bd4f237aec8d72d42d459f80a41c80e19128e74827a9741178a7ae7d29ba2182f52d7d35c9c69077be802fd885f106dd4cad4735f47908ba28cb33c7f0d89d9e582a1719858d2668e395dd90b70ad602cf8964efc7c962faf3f94fed45f9094bd", 0x9c}, {&(0x7f00000021c0)="b343d252de0688e813405785094c894b968884e63e5c481574a8ce8c7f18837dcb9b38b9fb820b54864d73c1de8ea9909653bd2337f421719cede269f502c68222cc0946d8afbaab013a62486ab992ee1ce9fe1f1e8031442bae1617b43cf09f645720b1777e903f47373df661db38c2631e049d2a02f1474150edd517b093b9caa06402be25e09439827b3ead99f197910d7c5b0ef8a79f6d56f1011b4c76dc080cb6ac3c3e31390bad548de8ea082130444e10745005bc717f2a54", 0xbc}, {&(0x7f0000002280)="6bbf821622d727e3ffa350ff50fe1d3b8f80d316ccef495c85bcb22cd8ffe9942fb571bc69d560cdf6f7a69e641d7528f7886211d42a2e7e2caaf59e41529bc78f2c045a337a6f84bff1406c178a0e79c31ef3965615cfac967fbadb3332cc736e7a3594d96d27ac069e60c5083d109a44a59add2905fca9da5a", 0x7a}, {&(0x7f0000002300)="69f2c3531211b743dfadb4d92a07803c657266a823a245334cb1eac661cbcf9caa50c43e9f16f38a71d52d71c8d0baef1f26c591f68c5bf982b39ac652c400a76a4d048634cb278c55616d706e6c793a", 0x50}, {&(0x7f0000002380)="6845ff7a30b7a784bcbda28aa54d25fedb0510137a3185cdfaed226362894666f24dc612bf0eede0bd54dc6f48d08497a47332d3ac4695966b9a3276935940afa3374c91e571c5427565b1976b746e596043b6758b0294caeb203328856ddc09e4729b1dab669fb7790c7666ca3810acd6bf609053a88327896d7203b754e10f490ac44571bef557575a94589c6a61e1d65f87fb123e17cd35f69027b0", 0x9d}], 0x7}], 0x5, 0x4000000) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) r2 = syz_genetlink_get_family_id$team(&(0x7f0000002600)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002640)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) getpeername$packet(r0, &(0x7f0000002dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002e00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000003140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003580)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000003680)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000036c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003780)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000037c0)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f00000038c0)=0xe8) getsockname$packet(r0, &(0x7f0000003a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003ac0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003dc0)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003ec0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003f00)={0x0, @multicast1, @broadcast}, &(0x7f0000003f40)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003f80)={0x0, @rand_addr, @initdev}, &(0x7f0000003fc0)=0xc) accept(r0, &(0x7f00000040c0)=@ll={0x11, 0x0, 0x0}, &(0x7f0000004140)=0x80) recvmsg(r1, &(0x7f0000006680)={&(0x7f0000004180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006580)=[{&(0x7f0000004200)=""/4096, 0x1000}, {&(0x7f0000005200)=""/12, 0xc}, {&(0x7f0000005240)=""/226, 0xe2}, {&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/114, 0x72}, {&(0x7f00000063c0)=""/80, 0x50}, {&(0x7f0000006440)=""/105, 0x69}, {&(0x7f00000064c0)=""/74, 0x4a}, {&(0x7f0000006540)=""/52, 0x34}], 0x9, &(0x7f0000006640)=""/25, 0x19}, 0x10001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006780)={'team0\x00', 0x0}) recvmsg$kcm(r0, &(0x7f0000006bc0)={&(0x7f0000006900)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000006a80)=[{&(0x7f0000006980)=""/198, 0xc6}], 0x1, &(0x7f0000006ac0)=""/254, 0xfe}, 0x0) recvmmsg(r0, &(0x7f00000088c0)=[{{&(0x7f0000006c80)=@nfc_llcp, 0x80, &(0x7f0000008040)=[{&(0x7f0000006d00)=""/250, 0xfa}, {&(0x7f0000006e00)=""/4096, 0x1000}, {&(0x7f0000007e00)=""/164, 0xa4}, {&(0x7f0000007ec0)=""/111, 0x6f}, {&(0x7f0000007f40)=""/221, 0xdd}], 0x5}, 0x3}, {{&(0x7f00000080c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000008700)=[{&(0x7f0000008140)=""/90, 0x5a}, {&(0x7f00000081c0)=""/65, 0x41}, {&(0x7f0000008240)=""/95, 0x5f}, {&(0x7f00000082c0)=""/222, 0xde}, {&(0x7f00000083c0)=""/39, 0x27}, {&(0x7f0000008400)=""/220, 0xdc}, {&(0x7f0000008500)=""/223, 0xdf}, {&(0x7f0000008600)=""/132, 0x84}, {&(0x7f00000086c0)=""/11, 0xb}], 0x9, &(0x7f00000087c0)=""/212, 0xd4}, 0x3}], 0x2, 0x2000, &(0x7f0000008940)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000008e80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40010000}, 0xc, &(0x7f0000008e40)={&(0x7f0000008980)={0x4a0, r2, 0x310, 0x70bd29, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x7c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x84, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r6}, {0x150, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x31f8, 0x0, 0x2, 0x60}, {0x7f, 0x8001, 0x8e2, 0x1}, {0x2800000000000, 0x8, 0x3, 0x9}, {0xe, 0x5, 0x0, 0x7}, {0x400, 0xec1c, 0xffffffff80000001, 0x6}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}]}}, {{0x8, 0x1, r9}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0xc4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1655b05d}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r14}, {0xb8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r17}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r18}}}]}}]}, 0x4a0}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r19 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r19, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x50) 03:44:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x48000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100f0000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2773.552363][ T2618] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33 sclass=netlink_tcpdiag_socket pig=2618 comm=syz-executor.2 03:44:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001008e270058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4c000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x6c000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000030058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:25 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x2, 0x2) dup(r0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:44:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100bc320058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010046030058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x68000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x74000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100003f0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010047030058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7a000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x470, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x3, 0x3e0, [0x0, 0x20000140, 0x200002e8, 0x200004f0], 0x0, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x5, 0x39, 0x22f0, 'ip6gretap0\x00', 'bpq0\x00', 'veth0\x00', 'bcsh0\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast, [], 0xb8, 0x128, 0x178, [@ip={'ip\x00', 0x20, {{@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff, 0xff000000, 0x5, 0xff, 0x28, 0x2, 0x4e23, 0x4e22, 0x4e24, 0x4e23}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@remote}}}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffe}}}]}, @common=@log={'log\x00', 0x28, {{0x800, "743895a25831d21e4967643c70cb792f0c0c60a2d4dba4812b75774bf969", 0x3}}}}]}, {0x0, '\x00', 0x1, 0x0, 0x2, [{{{0x5, 0x42, 0x22ff, 'bpq0\x00', 'bond_slave_0\x00', 'team0\x00', 'batadv0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff], @empty, [0x0, 0xff, 0xff, 0xff], 0xd0, 0xd0, 0x108, [@connlabel={'connlabel\x00', 0x8, {{0x1, 0x1}}}, @cpu={'cpu\x00', 0x8, {{0x7fffffff, 0x1}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}, {{{0x11, 0x40, 0x8917, 'nlmon0\x00', 'netdevsim0\x00', 'ifb0\x00', 'veth0_to_team\x00', @dev={[], 0xc}, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x13}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xa0, 0xa0, 0xd0, [@vlan={'vlan\x00', 0x8, {{0x3, 0x7, 0xe95f, 0x7}}}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x458) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:44:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6c000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000050058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7f010000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2776.419985][ T26] kauditd_printk_skb: 257 callbacks suppressed [ 2776.420001][ T26] audit: type=1400 audit(2000000667.459:105005): avc: denied { prog_load } for pid=2975 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x74000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010003460058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2776.646903][ T26] audit: type=1400 audit(2000000667.469:105006): avc: denied { map } for pid=2969 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2776.831158][ T26] audit: type=1400 audit(2000000667.489:105007): avc: denied { map } for pid=2969 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2776.987877][ T26] audit: type=1400 audit(2000000667.489:105008): avc: denied { map } for pid=2974 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2777.201776][ T26] audit: type=1400 audit(2000000667.489:105009): avc: denied { map } for pid=2974 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010096060058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:28 executing program 2: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000100)={0x800, 0x3, 'client0\x00', 0x0, "18ec9eb44d76933f", "05f7709e0b64799782ce09e9dd45090ebea6dbe45a73b2bad66e7c7c1b667c13", 0x3, 0x7731}) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0x200, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x90}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc800}, 0x20000000) [ 2777.442387][ T26] audit: type=1400 audit(2000000667.539:105010): avc: denied { map } for pid=2974 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x80040000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2777.564511][ T26] audit: type=1400 audit(2000000667.549:105011): avc: denied { map } for pid=2974 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7a000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2777.720903][ T26] audit: type=1400 audit(2000000667.559:105012): avc: denied { map } for pid=2969 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2777.833029][ T3110] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2777.888957][ T26] audit: type=1400 audit(2000000667.569:105013): avc: denied { map } for pid=2969 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100c00e0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010003470058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7f010000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x80ffffff}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100001f0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000000) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r2, 0xe0, '8q%', "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"}}, 0x110) 03:44:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100914c0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x80040000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x90ffffff}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2780.006588][ T3398] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 03:44:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xf8030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000600058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001008e270058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xf8030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000100), 0x0) 03:44:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xff000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010003460058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2781.432121][ T26] kauditd_printk_skb: 256 callbacks suppressed [ 2781.432137][ T26] audit: type=1400 audit(2000000672.479:105262): avc: denied { map } for pid=3659 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xff030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100278e0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2781.639331][ T26] audit: type=1400 audit(2000000672.519:105263): avc: denied { prog_load } for pid=3700 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x100000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2781.835635][ T26] audit: type=1400 audit(2000000672.539:105264): avc: denied { map } for pid=3690 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2781.990885][ T26] audit: type=1400 audit(2000000672.559:105265): avc: denied { map } for pid=3659 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2782.151347][ T26] audit: type=1400 audit(2000000672.579:105267): avc: denied { map } for pid=3690 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2782.286701][ T26] audit: type=1400 audit(2000000672.569:105266): avc: denied { prog_load } for pid=3700 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010003470058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:33 executing program 2: socket$netlink(0x10, 0x3, 0x100008000000004) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000200)={0x18, 0x0, 0x8, {0x1}}, 0x18) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400000, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000240)={0x43, 0x9, 0x2, {0x200, 0x0, 0x200, 0x5, 0x2, 0xa9b, 0x0, 0x0, 0x5}}, 0x43) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3, 0x9185, 0x0, 0x9, 0x4}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYBLOB="3f000600080001000800060005000785"], &(0x7f00000002c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x81, 0x8001, 0x8000, 0x2, 0x20, 0x8000, 0x200, 0x77bd, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r3, 0x0, 0xa34}, 0xb1) 03:44:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2782.485714][ T26] audit: type=1400 audit(2000000672.599:105268): avc: denied { map } for pid=3659 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001004c910058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xffffff80}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2782.630287][ T26] audit: type=1400 audit(2000000672.599:105269): avc: denied { map } for pid=3659 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x200000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2782.795684][ T26] audit: type=1400 audit(2000000672.609:105270): avc: denied { map } for pid=3690 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100914c0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2783.023846][ T26] audit: type=1400 audit(2000000672.609:105271): avc: denied { map } for pid=3690 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xffffff90}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010032bc0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x300000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100278e0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = dup3(0xffffffffffffffff, r0, 0x80000) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000440)=@v3={0x3000000, [{0x4, 0x6}, {0x1, 0x1}], r2}, 0x18, 0x2) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000100)) syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0xdb99, 0x200000) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000180)=0x9) getsockname$unix(r3, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000300)) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0x30, r1, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000340)) writev(r0, &(0x7f00000000c0), 0x0) 03:44:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x1000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x400000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000ec00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001004c910058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x500000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x100000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000e00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010006960058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000e8fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x38cb, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) 03:44:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x600000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000f00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x200000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2786.543432][ T26] kauditd_printk_skb: 217 callbacks suppressed [ 2786.543447][ T26] audit: type=1400 audit(2000000677.589:105486): avc: denied { map } for pid=4209 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2786.560423][ T26] audit: type=1400 audit(2000000677.609:105487): avc: denied { map } for pid=4209 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000ec00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2786.756229][ T26] audit: type=1400 audit(2000000677.669:105488): avc: denied { map } for pid=4209 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x700000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x300000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2786.938728][ T26] audit: type=1400 audit(2000000677.679:105489): avc: denied { map } for pid=4209 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.110462][ T26] audit: type=1400 audit(2000000677.699:105490): avc: denied { map } for pid=4209 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.324626][ T26] audit: type=1400 audit(2000000677.709:105491): avc: denied { map } for pid=4209 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:38 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x40000, 0x0) sendto$isdn(r1, &(0x7f0000000240)={0x100, 0x5, "155f942d14e7497169ae3f52cbbfb28ed6efca966cbf6ab8326709f030"}, 0x25, 0x20000011, &(0x7f00000002c0)={0x22, 0x8000, 0x1, 0x0, 0xd4be}, 0x6) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0xfff000000000000, 0x5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x60f}, &(0x7f0000000200)=0x8) syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x1, 0x206100) r3 = socket$netlink(0x10, 0x3, 0x100007fffffffff) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2787.486475][ T26] audit: type=1400 audit(2000000677.709:105492): avc: denied { map } for pid=4218 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.672565][ T26] audit: type=1400 audit(2000000677.729:105493): avc: denied { map } for pid=4209 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000e00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2787.862232][ T26] audit: type=1400 audit(2000000677.739:105494): avc: denied { map } for pid=4209 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.908485][ T4325] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x400000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3f00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000ec0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000f00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x500000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4000000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000033fe0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:40 executing program 2: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1, 0x3ae22d502c6f2618) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000580), 0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0xf3, "c89e9b6826f75722616d34144b9b0a66868f50ee6cd2a4c3222d262b7ca12269973501d1cda22d7f2ea0cab9997f4a7a0c9d2b4b43646bf3da0a86d22f67c5795f8a3c545adacb119d34e32475dde23b557deadbdf5a201f96d56efe2c84625d1410217946596a4005c4339db4706dcef58068073630c3c4750af91a4bbfe2d18e2bca0a805a9db59d8d21c1f09be60ac05a2c2d6771f1f2193cf61b0f5fee5862051165fc25c768f0767bf9f7ed255a66460a8c89813c6eddf58c5f459ea0ffbc3488a8dfec6d6e5eb06172f9f1f12096c7955b63da3cd97e8d8cdc8abeb63f9d1c4cc7be3bcfe923863b3774139b06be1f89"}, &(0x7f0000000300)=0xfb) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e23, 0x3, @mcast1, 0x4}}, 0xaf4, 0x8, 0x9, 0xffffffffffff7fff}, &(0x7f0000000400)=0x98) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2400000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0xb00, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') 03:44:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x600000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4703000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000ffff000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x700000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4800000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={r0}) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x1, 0x5}}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1000000000000085) 03:44:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000ec0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000020058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2791.557313][ T26] kauditd_printk_skb: 252 callbacks suppressed [ 2791.557328][ T26] audit: type=1400 audit(2000000682.609:105733): avc: denied { map } for pid=4789 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xa00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2791.739046][ T26] audit: type=1400 audit(2000000682.649:105734): avc: denied { map } for pid=4790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4c00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2791.915318][ T26] audit: type=1400 audit(2000000682.649:105735): avc: denied { map } for pid=4789 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000040058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2792.073039][ T26] audit: type=1400 audit(2000000682.649:105736): avc: denied { map } for pid=4789 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000033fe0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2792.295327][ T26] audit: type=1400 audit(2000000682.709:105737): avc: denied { map } for pid=4790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2792.418855][ T26] audit: type=1400 audit(2000000682.729:105738): avc: denied { map } for pid=4789 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2792.602160][ T26] audit: type=1400 audit(2000000682.739:105739): avc: denied { map } for pid=4789 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x3f00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6800000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = semget(0x1, 0x5, 0x20) semctl$GETNCNT(r1, 0x4, 0xe, &(0x7f00000000c0)=""/109) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2792.807310][ T26] audit: type=1400 audit(2000000682.739:105740): avc: denied { map } for pid=4789 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000050058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2792.962531][ T26] audit: type=1400 audit(2000000682.749:105741): avc: denied { map } for pid=4790 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2793.116941][ T4911] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000ffff000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000080058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6c00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x4000000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000020058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:45 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x412100, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000540)={'icmp6\x00'}, &(0x7f0000000580)=0x1e) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80000, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x2, 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x0, 0x30}, &(0x7f0000000440)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000480)=@assoc_value={r5}, &(0x7f00000004c0)=0x8) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x8, 0x80) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x100, 0x0) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x400001, 0x0) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/enforce\x00', 0x484101, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xb8, r2, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4617}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r1}, {0x8, 0x1, r9}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x104}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000001}, 0x40000) 03:44:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000a0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7400000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x4703000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000030058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000e0058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7a00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x4800000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000040058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x2}, &(0x7f00000001c0)=0x8) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:44:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000100058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7f01000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x4c00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2796.568070][ T26] kauditd_printk_skb: 223 callbacks suppressed [ 2796.568086][ T26] audit: type=1400 audit(2000000687.619:105963): avc: denied { map } for pid=5163 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2796.801326][ T26] audit: type=1400 audit(2000000687.619:105964): avc: denied { map } for pid=5166 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2796.990169][ T26] audit: type=1400 audit(2000000687.659:105965): avc: denied { map } for pid=5166 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000600058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2797.222258][ T26] audit: type=1400 audit(2000000687.659:105966): avc: denied { map } for pid=5163 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2797.425970][ T26] audit: type=1400 audit(2000000687.699:105967): avc: denied { map } for pid=5163 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2797.599109][ T26] audit: type=1400 audit(2000000687.699:105968): avc: denied { map } for pid=5163 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0xfffffffffffffdef}], 0x1) [ 2797.652790][ T5369] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2797.674104][ T5271] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2797.687618][ T5304] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000050058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2797.715805][ T5304] audit: audit_lost=1290 audit_rate_limit=0 audit_backlog_limit=64 03:44:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x8004000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x6800000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000e00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8) r1 = dup3(r0, r0, 0x80000) syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f00000000c0)=0x9) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:44:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000080058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xf803000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x6c00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000f00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000100058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff03000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7400000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000460358000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000e00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c56ff07620200ff818044010000000058800b482406006400940e050028845a01000000000000008000f0fffeffe80000000080000001000010000100070c100000000037bb40000000cc57a4933116a36ef9c5e3eb2a39392842c5f49124207573527cc7200af486a57264e59cd4b6454b973acc37c2ad16ce76dc719cc103b0458ebff7b8ec9756572a94ac3e52495cf539aa136adfa55f0b0621cfc774ccfad4b7005cdf74748d1c2d1a983eeaa6fa238f193e", 0xc3}], 0x1) 03:44:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xffffffff00000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7a00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:52 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x68bc, 0xc6000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000007c0)={'ip6gretap0\x00', r1}) r2 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) ioctl$TIOCNXCL(r0, 0x540d) 03:44:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000f00058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='\"yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x7f01000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000470358000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2801.849485][ T26] kauditd_printk_skb: 277 callbacks suppressed [ 2801.849500][ T26] audit: type=1400 audit(2000000692.899:106232): avc: denied { map } for pid=5658 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2802.062904][ T26] audit: type=1400 audit(2000000692.959:106233): avc: denied { map } for pid=5658 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000358000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2802.246329][ T26] audit: type=1400 audit(2000000692.959:106234): avc: denied { map } for pid=5658 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='#yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2802.418499][ T26] audit: type=1400 audit(2000000692.959:106235): avc: denied { map } for pid=5658 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:53 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x400, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000100)) 03:44:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x8004000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2802.575631][ T26] audit: type=1400 audit(2000000693.069:106236): avc: denied { map } for pid=5658 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2802.775688][ T26] audit: type=1400 audit(2000000693.069:106237): avc: denied { map } for pid=5658 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000558000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2802.981596][ T26] audit: type=1400 audit(2000000693.069:106238): avc: denied { map } for pid=5658 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000460358000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='%yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2803.185698][ T26] audit: type=1400 audit(2000000693.189:106239): avc: denied { map } for pid=5658 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2803.294213][ T26] audit: type=1400 audit(2000000693.189:106240): avc: denied { map } for pid=5658 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2803.452631][ T5773] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x80ffffff00000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000a58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='*yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000470358000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:55 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x2, 0x5, @loopback, 0x200}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={r1, 0xab, "5c62998fc2e41f868bee45d680e4faa1fa71235fdfacd2fc5a84f5c4c525f08423e4a37894c93acc3087ad61e0e9192a571e7781154294a054ad89ab91dadc76c5c40f95a7ce18dc2af3b041b55206b4379f9fa7b47ec230cafe59232d9164574824a9d5c6e26179f66c26efc80dfcd1d1374bf540d3861e63a69e534ebe00f595173b88a1f3746212e6e20b89a52436d8f459f8ebb547b14c599aead2af6ed51aed05b265123b41e82476"}, &(0x7f00000002c0)=0xb3) r2 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:44:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x90ffffff00000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000e58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='+yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000558000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xf803000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000c00e58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000960658000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='-yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:56 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0xc4bc, 0x400, 0x4, 0x7f, 0x4, 0x5, 0x3ff, 0x17, 0x17f, 0x4, 0x7, 0x3}) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) tee(r0, r1, 0x9, 0x9) accept(r0, &(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, &(0x7f0000000240)=0x80) r2 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x0, 0x0) 03:44:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xff00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000001f58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:44:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:44:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000c00e58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='.yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xff03000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2807.052380][ T26] kauditd_printk_skb: 244 callbacks suppressed [ 2807.052393][ T26] audit: type=1400 audit(2000000698.099:106483): avc: denied { map } for pid=6084 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100008e2758000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2807.195720][ T26] audit: type=1400 audit(2000000698.119:106484): avc: denied { map } for pid=6084 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000001f58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:44:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='0yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2807.345986][ T26] audit: type=1400 audit(2000000698.139:106485): avc: denied { map } for pid=6084 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0xffffffff00000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x101001, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e22, @empty}, {0x307, @remote}, 0x6, {0x2, 0x4e22, @loopback}, 'team_slave_0\x00'}) [ 2807.518501][ T26] audit: type=1400 audit(2000000698.159:106486): avc: denied { map } for pid=6084 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2807.696861][ T26] audit: type=1400 audit(2000000698.189:106487): avc: denied { map } for pid=6084 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2807.917967][ T26] audit: type=1400 audit(2000000698.229:106488): avc: denied { map } for pid=6084 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000bc3258000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2808.086973][ T26] audit: type=1400 audit(2000000698.239:106489): avc: denied { map } for pid=6084 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100008e2758000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2808.189926][ T6159] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2808.219285][ T6150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2808.226019][ T6159] audit: audit_lost=1297 audit_rate_limit=0 audit_backlog_limit=64 03:44:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:44:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='Xyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = getpid() r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) ptrace$setsig(0x4203, r1, 0x4, &(0x7f00000000c0)={0x10, 0x80000001, 0xaedc}) 03:45:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000003f58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000034658000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='cyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000034658000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000034758000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='dyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x13f, 0x1009}}, 0x20) 03:45:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000034758000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000914c58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x5}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='iyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000914c58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000278e58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='lyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2812.083568][ T26] kauditd_printk_skb: 257 callbacks suppressed [ 2812.083584][ T26] audit: type=1400 audit(2000000703.129:106738): avc: denied { map } for pid=6426 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = syz_open_dev$cec(&(0x7f0000009500)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000009540)=@assoc_id=0x0, &(0x7f0000009580)=0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000095c0)={0x1000, 0x1, 0x400, 0x6, r2}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000006058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2812.499624][ T26] audit: type=1400 audit(2000000703.549:106739): avc: denied { map } for pid=6527 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2812.638205][ T26] audit: type=1400 audit(2000000703.549:106740): avc: denied { map } for pid=6527 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100004c9158000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2812.803676][ T26] audit: type=1400 audit(2000000703.549:106741): avc: denied { map } for pid=6527 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='oyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2812.995907][ T26] audit: type=1400 audit(2000000703.549:106742): avc: denied { map } for pid=6527 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2813.168824][ T26] audit: type=1400 audit(2000000703.599:106743): avc: denied { map } for pid=6532 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2813.385695][ T26] audit: type=1400 audit(2000000703.609:106744): avc: denied { map } for pid=6532 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2813.585801][ T26] audit: type=1400 audit(2000000703.619:106745): avc: denied { map } for pid=6527 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2813.739185][ T26] audit: type=1400 audit(2000000703.639:106746): avc: denied { map } for pid=6532 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000069658000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2813.791140][ T6698] audit: audit_backlog=65 > audit_backlog_limit=64 03:45:04 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x80000001) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:45:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='pyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xa}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000278e58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000ec058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x48}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='uyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x29}], 0x100000000000018d) 03:45:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100004c9158000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4c}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000e058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='xyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x68}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000032bc58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='s\"zkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000f058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2817.099639][ T26] kauditd_printk_skb: 263 callbacks suppressed [ 2817.099655][ T26] audit: type=1400 audit(2000000708.149:106978): avc: denied { map } for pid=6999 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2817.276458][ T26] audit: type=1400 audit(2000000708.149:106979): avc: denied { map } for pid=7001 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6c}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000200000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='sy\"kaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000440)=""/92, 0x5c}, &(0x7f00000004c0), 0x26}, 0x20) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940005e11f845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000540)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x1bc}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000002c0)={r3, 0x0, 0x9d60, 0x1}, 0x10) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x8e}, &(0x7f0000000200)=0x8) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000100)={0x8, 0x9, 0x64, @local, 'dummy0\x00'}) write$vnet(r2, &(0x7f0000000380)={0x1, {&(0x7f0000000400)=""/40, 0x107, &(0x7f0000000340)=""/51, 0x3, 0x7}}, 0x57) [ 2817.452460][ T26] audit: type=1400 audit(2000000708.159:106980): avc: denied { map } for pid=6999 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000ec058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2817.626131][ T26] audit: type=1400 audit(2000000708.179:106981): avc: denied { map } for pid=7001 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2817.765661][ T26] audit: type=1400 audit(2000000708.209:106982): avc: denied { map } for pid=7001 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2817.905827][ T26] audit: type=1400 audit(2000000708.219:106983): avc: denied { map } for pid=6999 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2818.060037][ T26] audit: type=1400 audit(2000000708.259:106984): avc: denied { map } for pid=7001 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000000f000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2818.261334][ T26] audit: type=1400 audit(2000000708.269:106985): avc: denied { map } for pid=7001 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x74}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzk%ller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000e058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2818.458031][ T26] audit: type=1400 audit(2000000708.279:106986): avc: denied { map } for pid=7003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2818.637141][ T26] audit: type=1400 audit(2000000708.279:106987): avc: denied { map } for pid=7003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7a}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000048000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:10 executing program 2: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x7d, 0x0) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000100)={0x80000001, 0x2}) 03:45:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka#ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000f058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x17f}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000258000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka%ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000200000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x300}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x202600, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100)=0xf, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka*ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000000f000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x347}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000358000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2822.107726][ T26] kauditd_printk_skb: 295 callbacks suppressed [ 2822.107741][ T26] audit: type=1400 audit(2000000713.159:107226): avc: denied { map } for pid=7348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka+ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2822.326996][ T26] audit: type=1400 audit(2000000713.159:107227): avc: denied { map } for pid=7348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2822.516939][ T26] audit: type=1400 audit(2000000713.159:107228): avc: denied { map } for pid=7380 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xb) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x9a20, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x9, 0x4000, 0x7ff, 0x3ff, 0xffffffff, 0x3}, 0x1}, 0xa) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2822.716313][ T26] audit: type=1400 audit(2000000713.159:107229): avc: denied { map } for pid=7380 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3f8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000048000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000458000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2822.874707][ T26] audit: type=1400 audit(2000000713.209:107230): avc: denied { prog_load } for pid=7397 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2823.044774][ T26] audit: type=1400 audit(2000000713.619:107231): avc: denied { map } for pid=7468 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka-ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2823.232359][ T26] audit: type=1400 audit(2000000713.629:107232): avc: denied { map } for pid=7468 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2823.375826][ T26] audit: type=1400 audit(2000000713.649:107234): avc: denied { map } for pid=7468 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2823.579189][ T26] audit: type=1400 audit(2000000713.649:107235): avc: denied { map } for pid=7468 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000258000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2823.703108][ T7523] audit: audit_backlog=65 > audit_backlog_limit=64 03:45:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x480}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000558000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka.ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000002480)=[{&(0x7f00000022c0)="259bcd549e50fce4e1fa05b5633d97c20683cdaa12bf9381f4023e7c5980af07c0c622af4c364972c412dbd80969b2888e0a19b6e5d7384846720c8110d6227b29084b77bea8748cbcfc2510268576620f6f03bbcfcb40d1a377543b629370ec375ab08a7790e4fd895fe384d4cd7a51517a6eebaa4c55fcb0f19b9f9d8946eb594b128c9150bed8b4ae95f697ca3c59e0e8f6a1c56378e20551925904c0d84cbf9839f0477a6f850052a4971b1f00a79865e327f9657cf95fc4525ca7ffc20812cd85b1", 0xc4}, {&(0x7f00000023c0)="3b4ffbb9c38d9167b6670208dd20f0718efd6ba362697a7ba0cb6fa0575f7337de2317b0a37adc6acfb866438a98578b28156e3503d8441d3b09d6c639b053da77b999da057a0ae75fa2bad090153e06ca9d8034ba301416bdca14710c775290014cb2e7600197e26f9e999a52d49e967dc94782b83139f8619a72e62e1ddbac19d4bc8e364d9df486f7d86866", 0x8d}], 0x2) ioctl(r0, 0x5, &(0x7f00000000c0)="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") 03:45:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000458000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x500}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000858000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2825.240466][ T7639] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=20638 sclass=netlink_tcpdiag_socket pig=7639 comm=syz-executor.2 03:45:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka0ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x600}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000001058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000558000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaLler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x700}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000e058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000858000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:18 executing program 2: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1e, 0x100) [ 2827.119398][ T26] kauditd_printk_skb: 255 callbacks suppressed [ 2827.119413][ T26] audit: type=1400 audit(2000000718.169:107482): avc: denied { map } for pid=7862 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2827.267006][ T26] audit: type=1400 audit(2000000718.169:107483): avc: denied { map } for pid=7862 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkauler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2827.466968][ T26] audit: type=1400 audit(2000000718.209:107484): avc: denied { map } for pid=7866 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xa00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2827.618046][ T26] audit: type=1400 audit(2000000718.209:107485): avc: denied { map } for pid=7866 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2827.814051][ T26] audit: type=1400 audit(2000000718.209:107486): avc: denied { map } for pid=7867 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000a58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2827.968117][ T26] audit: type=1400 audit(2000000718.239:107487): avc: denied { prog_load } for pid=7865 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:45:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal#er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2828.165753][ T26] audit: type=1400 audit(2000000718.259:107488): avc: denied { map } for pid=7866 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2828.334795][ T26] audit: type=1400 audit(2000000718.269:107490): avc: denied { prog_load } for pid=7865 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:45:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3f00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000ec0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2828.509001][ T26] audit: type=1400 audit(2000000718.259:107489): avc: denied { map } for pid=7866 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2828.630653][ T26] audit: type=1400 audit(2000000718.299:107491): avc: denied { map } for pid=7866 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal%er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x4d}], 0x246) 03:45:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000e58000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000000f000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal*er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000104) r1 = gettid() sched_getscheduler(r1) ptrace$setregset(0x4205, r1, 0x200, &(0x7f0000000100)={&(0x7f0000000000)="ca41bc696e84653c727a3e79871177d9f43e99b326aa2ea76851bb7d6d3c506f4db007779c17ca78561072470215b0b1a7ae1a3333fe0808a803f6131c4d432d46eceb435a1ecb864e6a1e9df2c8a8717c06f56145c1c46edeebe56586f52528034bf8c53632ce4ecb78e9fd611a22c52c07b6fa1a744fa10e3ddb03d7b5747746ae067c16215ed0219f886ccbf5111d36d848ed8420de3ba4199616d5b33ec537697b20585eedd8ccbb97c507d97ed748d1672cbd7ecdeb1c2908ede6524760df1e8dbf84bf5ab6fbbc7e91ffd3105b9a0996e73b575a363bbee9be1892718ac8b2a98591ba8aab0cfc6ad2f0", 0xed}) writev(r0, &(0x7f0000000080), 0x1000000000000180) 03:45:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000048000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000001058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4703}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal+er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4800}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000006058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal-er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000010c0)={&(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000e00000/0x200000)=nil, &(0x7f0000eda000/0x4000)=nil, &(0x7f0000f88000/0x4000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000f5c000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fed000/0x3000)=nil, &(0x7f00000000c0)="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", 0x1000, r0}, 0x68) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c00e0b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4c00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2832.139007][ T26] kauditd_printk_skb: 230 callbacks suppressed [ 2832.139022][ T26] audit: type=1400 audit(2000000723.189:107720): avc: denied { map } for pid=8297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal.er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000e058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2832.390631][ T26] audit: type=1400 audit(2000000723.179:107719): avc: denied { map } for pid=8292 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005802004824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2832.607398][ T26] audit: type=1400 audit(2000000723.189:107721): avc: denied { map } for pid=8292 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2832.764594][ T26] audit: type=1400 audit(2000000723.209:107722): avc: denied { map } for pid=8297 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6800}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2832.933168][ T26] audit: type=1400 audit(2000000723.219:107723): avc: denied { map } for pid=8297 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:24 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x80081) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@remote={[], 0x2}, 0xf, 'bridge0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2833.105964][ T26] audit: type=1400 audit(2000000723.219:107724): avc: denied { map } for pid=8297 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal0er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2833.318206][ T26] audit: type=1400 audit(2000000723.229:107725): avc: denied { map } for pid=8292 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2833.516298][ T26] audit: type=1400 audit(2000000723.229:107726): avc: denied { map } for pid=8292 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2833.715155][ T26] audit: type=1400 audit(2000000723.299:107727): avc: denied { map } for pid=8297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6c00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2833.901700][ T26] audit: type=1400 audit(2000000723.299:107728): avc: denied { map } for pid=8297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058020b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalLer\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000ec0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7400}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000100)) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000000f000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaluer\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058030b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7a00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkall\"r\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000048000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058040b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7f01}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) gettid() openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = accept(r0, &(0x7f00000002c0)=@rc, &(0x7f0000000200)=0xfffffffffffffd85) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000000c0)=0x1e) 03:45:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkall%r\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c0000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2837.149589][ T26] kauditd_printk_skb: 211 callbacks suppressed [ 2837.149606][ T26] audit: type=1400 audit(2000000728.199:107940): avc: denied { map } for pid=8906 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058050b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2837.390243][ T26] audit: type=1400 audit(2000000728.249:107941): avc: denied { map } for pid=8906 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x8004}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2837.583098][ T26] audit: type=1400 audit(2000000728.269:107942): avc: denied { map } for pid=8906 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2837.776847][ T26] audit: type=1400 audit(2000000728.339:107943): avc: denied { map } for pid=8902 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\"\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000c00e0b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2837.994139][ T26] audit: type=1400 audit(2000000728.339:107944): avc: denied { map } for pid=8902 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2838.173294][ T26] audit: type=1400 audit(2000000728.359:107945): avc: denied { map } for pid=8906 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2838.350435][ T26] audit: type=1400 audit(2000000728.379:107946): avc: denied { map } for pid=8906 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058080b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xf803}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2838.546984][ T26] audit: type=1400 audit(2000000728.389:107947): avc: denied { map } for pid=8906 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:29 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x101a01, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000100)={0xfff, 0x0, 'client0\x00', 0x4, "42a9cc2bb18a3f00", "31c21f92cd6731526a54f01d5d18314e00", 0xffffffffffffffff, 0xac}) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2838.683305][ T26] audit: type=1400 audit(2000000728.469:107948): avc: denied { map } for pid=8906 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2838.771156][ T9031] audit: audit_backlog=65 > audit_backlog_limit=64 03:45:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005802004824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle%\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058100b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff00}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\x7f\x01\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058020b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000180)={0xcf9a, {{0xa, 0x4e21, 0x7, @remote, 0xfffffffffffffffa}}, {{0xa, 0x4e21, 0x1000, @local, 0x100}}}, 0x108) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000100)=0x20, 0x4) 03:45:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff03}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058e00b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\x80\x01\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058040b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\x80\x04\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) ioctl$void(r0, 0xc0045c79) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) flistxattr(r0, &(0x7f00000000c0)=""/194, 0xc2) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) write$selinux_attr(r1, &(0x7f0000000200)='system_u:object_r:cert_t:s0\x00', 0x1c) 03:45:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058050b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2842.174662][ T26] kauditd_printk_skb: 228 callbacks suppressed [ 2842.174677][ T26] audit: type=1400 audit(2000000733.219:108169): avc: denied { map } for pid=9412 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005800174824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2842.365659][ T26] audit: type=1400 audit(2000000733.229:108170): avc: denied { map } for pid=9412 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x2000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2842.545809][ T26] audit: type=1400 audit(2000000733.269:108171): avc: denied { map } for pid=9494 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2842.767679][ T26] audit: type=1400 audit(2000000733.289:108172): avc: denied { map } for pid=9494 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x02\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058080b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2842.937105][ T26] audit: type=1400 audit(2000000733.339:108173): avc: denied { map } for pid=9494 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2843.055075][ T26] audit: type=1400 audit(2000000733.339:108174): avc: denied { prog_load } for pid=9526 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2843.215680][ T26] audit: type=1400 audit(2000000733.379:108175): avc: denied { prog_load } for pid=9526 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2843.360001][ T26] audit: type=1400 audit(2000000733.379:108176): avc: denied { map } for pid=9494 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058001f4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2843.576796][ T26] audit: type=1400 audit(2000000733.389:108177): avc: denied { map } for pid=9494 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.770351][ T26] audit: type=1400 audit(2000000733.409:108178): avc: denied { map } for pid=9494 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:34 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x80}) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller*\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000580a0b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005800204824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x5000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x92\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff8100400100000000580e0b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005800044824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:36 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000100)={0x40000000, 0x100, "fa22ac8e78b4267fa6efb1e2b9ec5e4738920ec5ca68f98a777aef8de9d9cb7a", 0x9, 0xfffffffffffffff9, 0x8, 0x0, 0x6, 0x8001, 0x400, 0x43c, [0x1, 0xfff, 0x9, 0x3]}) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x7, 0x20000) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000280)={0x0, r3}) 03:45:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x93\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058100b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xa6\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005800174824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058600b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x200402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="f4571593cee85260a364b8c762ddf98c5b0975754a8b00f8a7fffde051612554611e83741df9ce76c0b65672c63d5ce1e40e9d7df31ec1a80235e3e6fa371b6b5409a69841d5173c67b912028929c9016bb5315ea78ea7cc4e429d9842db37767b279cad0d326af850e3a6ae", 0x6c}], 0x1, &(0x7f00000001c0)=[@assoc={0x18, 0x117, 0x4, 0x8001}, @iv={0x90, 0x117, 0x2, 0x7c, "f9a8bbce48566a69bfb641fdcd092df45b2710d6528e04d507cbb437a143b21d584356c5132669473ec35aa77d22af7fed1608987f18b28b3618b65613d9749460fab2571a83eb95010193b68d51aa92bd230efe14325e15f6b734abd4f0b0a02167875f6691564c9f3a6e029e1a353782aca7fce67e89c981df413c"}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}], 0xf0, 0x20040011}, 0x4000000) 03:45:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xa000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xaa\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2847.187463][ T26] kauditd_printk_skb: 248 callbacks suppressed [ 2847.187479][ T26] audit: type=1400 audit(2000000738.239:108400): avc: denied { map } for pid=10111 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2847.395869][ T26] audit: type=1400 audit(2000000738.359:108401): avc: denied { map } for pid=10112 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2847.582967][ T26] audit: type=1400 audit(2000000738.359:108402): avc: denied { map } for pid=10112 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058e00b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3f000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b3724ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2847.780453][ T26] audit: type=1400 audit(2000000738.439:108403): avc: denied { map } for pid=10116 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xbb\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2847.960602][ T26] audit: type=1400 audit(2000000738.449:108404): avc: denied { map } for pid=10114 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2848.141781][ T26] audit: type=1400 audit(2000000738.469:108405): avc: denied { map } for pid=10114 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2848.339083][ T26] audit: type=1400 audit(2000000738.469:108406): avc: denied { map } for pid=10114 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2848.517944][ T26] audit: type=1400 audit(2000000738.469:108407): avc: denied { map } for pid=10114 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000160007041dfffd946f6105000a0000001f0000000000080008001d0004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r3 = getpid() capget(&(0x7f00000000c0)={0x39980732, r3}, &(0x7f0000000100)={0xfffffffffffff8fb, 0x7, 0x4, 0x200, 0x4, 0x7}) 03:45:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2848.656105][T10234] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2848.662912][T10216] audit: audit_backlog=65 > audit_backlog_limit=64 03:45:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x40000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005800174824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca235f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xc1\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2849.343471][T10244] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2849.466753][T10244] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:45:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x47030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058001f4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller[\x01/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca355f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xa1\x01/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008200000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005800204824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x48000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca395f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caa95f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4c000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x1c\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff81004001000000005800174824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8100008000100004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2852.198764][ T26] kauditd_printk_skb: 234 callbacks suppressed [ 2852.198780][ T26] audit: type=1400 audit(2000000743.249:108638): avc: denied { map } for pid=10387 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2852.415003][ T26] audit: type=1400 audit(2000000743.289:108639): avc: denied { map } for pid=10389 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x80\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824cace5f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x68000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2852.596645][ T26] audit: type=1400 audit(2000000743.289:108640): avc: denied { map } for pid=10389 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b3724ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2852.825730][ T26] audit: type=1400 audit(2000000743.309:108641): avc: denied { map } for pid=10394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), 0x4) [ 2853.055731][ T26] audit: type=1400 audit(2000000743.309:108642): avc: denied { map } for pid=10387 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2853.255640][ T26] audit: type=1400 audit(2000000743.319:108643): avc: denied { map } for pid=10394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2853.347319][T10410] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2853.361103][T10405] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2853.384349][T10410] audit: audit_lost=1349 audit_rate_limit=0 audit_backlog_limit=64 [ 2853.410622][T10408] audit: audit_backlog=65 > audit_backlog_limit=64 03:45:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caec5f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xdf\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6c000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca235f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xe5\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:45 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200800, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) 03:45:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caf15f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca355f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x74000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\"\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7a000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca395f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caf85f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller-\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7f010000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:47 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x200, 0x200000) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000380)={0x0, @initdev, @broadcast}, &(0x7f00000003c0)=0xc) recvmmsg(r1, &(0x7f0000004880)=[{{&(0x7f00000004c0)=@caif=@util, 0x80, &(0x7f0000002900)=[{&(0x7f0000000540)}, {&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/33, 0x21}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/110, 0x6e}, {&(0x7f0000001900)=""/4096, 0x1000}], 0x1296}, 0x1f}, {{&(0x7f0000002980)=@ax25={{0x3, @rose}, [@default, @bcast, @remote, @null, @netrom, @null, @default, @bcast]}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002a00)=""/141, 0x8d}, {&(0x7f0000002ac0)=""/227, 0xe3}], 0x2, &(0x7f0000002c00)=""/31, 0x1f}, 0x48b1}, {{&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002cc0)=""/241, 0xf1}, {&(0x7f0000002dc0)=""/66, 0x42}, {&(0x7f0000002e40)=""/224, 0xe0}, {&(0x7f0000002f40)=""/210, 0xd2}, {&(0x7f0000003040)=""/174, 0xae}], 0x5, &(0x7f0000003180)=""/112, 0x70}, 0x78d6}, {{&(0x7f0000003200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003280)=""/122, 0x7a}, {&(0x7f0000003300)=""/227, 0xe3}], 0x2, &(0x7f0000003440)=""/138, 0x8a}, 0x20000}, {{&(0x7f0000003500)=@nfc_llcp, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003580)=""/139, 0x8b}, {&(0x7f0000003640)=""/73, 0x49}, {&(0x7f00000036c0)=""/223, 0xdf}, {&(0x7f00000037c0)=""/230, 0xe6}, {&(0x7f00000038c0)=""/239, 0xef}, {&(0x7f00000039c0)=""/242, 0xf2}, {&(0x7f0000003ac0)=""/253, 0xfd}, {&(0x7f0000003bc0)=""/105, 0x69}, {&(0x7f0000003c40)=""/47, 0x2f}], 0x9, &(0x7f0000003d40)=""/186, 0xba}, 0x7}, {{&(0x7f0000003e00)=@nfc_llcp, 0x80, &(0x7f0000004300)=[{&(0x7f0000003e80)=""/56, 0x38}, {&(0x7f0000003ec0)=""/248, 0xf8}, {&(0x7f0000003fc0)=""/192, 0xc0}, {&(0x7f0000004080)}, {&(0x7f00000040c0)=""/113, 0x71}, {&(0x7f0000004140)=""/100, 0x64}, {&(0x7f00000041c0)=""/184, 0xb8}, {&(0x7f0000004280)=""/113, 0x71}], 0x8, &(0x7f0000004380)=""/111, 0x6f}, 0x8}, {{&(0x7f0000004400)=@ethernet={0x0, @local}, 0x80, &(0x7f0000004600)=[{&(0x7f0000004480)=""/42, 0x2a}, {&(0x7f00000044c0)=""/64, 0x40}, {&(0x7f0000004500)=""/12, 0xc}, {&(0x7f0000004540)=""/170, 0xaa}], 0x4, &(0x7f0000004640)=""/109, 0x6d}, 0xfffffffffffeffff}, {{0x0, 0x0, &(0x7f0000004840)=[{&(0x7f00000046c0)=""/163, 0xa3}, {&(0x7f0000004780)=""/142, 0x8e}], 0x2}, 0x5}], 0x8, 0x2000, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000004a80)={@rand_addr, 0x0}, &(0x7f0000004ac0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004b00)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000004bc0)={'veth1_to_team\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004e00)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000004f00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000004f40)={@remote, @empty, 0x0}, &(0x7f0000004f80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005000)=0x14, 0x80000) accept4$packet(0xffffffffffffff9c, &(0x7f0000006c40)={0x11, 0x0, 0x0}, &(0x7f0000006c80)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000006cc0)={'ip6erspan0\x00', 0x0}) accept4$packet(r1, &(0x7f000000cb80)={0x11, 0x0, 0x0}, &(0x7f000000cbc0)=0x14, 0x800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000e180)={0x0, @loopback, @local}, &(0x7f000000e1c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000e240)={0x0, @local, @remote}, &(0x7f000000e280)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f000000e2c0)={@mcast2, 0x0}, &(0x7f000000e300)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f000000e340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000e380)=0x14, 0x80000) accept4$packet(0xffffffffffffffff, &(0x7f000000e3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000e400)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000e440)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000e480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000e4c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000e6c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000e700)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f000000e740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000e780)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000eec0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f000000ee80)={&(0x7f000000e7c0)={0x6a0, r2, 0x320, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x164, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x7, 0x8, 0x5, 0xfffffffffffffff8}, {0x9, 0x101, 0x2f, 0x7fffffff}, {0x2, 0x551e, 0x10001, 0x7}, {0x8001, 0x800, 0xed89, 0x7fffffff}, {0x101, 0x8001, 0x6df, 0x40}, {0x1, 0x3, 0x23a, 0x20}, {0x400, 0x6, 0x680000000, 0x7ff}, {0x7, 0x6, 0x40000000, 0xdf}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x198, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xce}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3405}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}}]}}, {{0x8, 0x1, r11}, {0x80, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3dc2}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x1dc, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x10c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}]}, 0x6a0}, 0x1, 0x0, 0x0, 0x50}, 0x24000001) 03:45:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caa95f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824cafd5f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller;\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x80040000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2857.298324][ T26] kauditd_printk_skb: 275 callbacks suppressed [ 2857.298339][ T26] audit: type=1400 audit(2000000748.349:108914): avc: denied { map } for pid=10697 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824cace5f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2857.476921][ T26] audit: type=1400 audit(2000000748.389:108915): avc: denied { map } for pid=10697 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @multicast2}, &(0x7f0000000100)=0xc) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@dev={0xfe, 0x80, [], 0x19}, @in6=@remote, 0x4e22, 0x7ff80000, 0x4e21, 0x2, 0x2, 0x20, 0x80, 0x0, r1, r2}, {0x8, 0x5, 0xf6, 0x8c, 0x400, 0x6, 0x3f, 0x41a2}, {0x5, 0x11c, 0x1, 0x7}, 0x8, 0x6e6bb2, 0x2, 0x0, 0x1, 0x3}, {{@in6=@remote, 0x4d5, 0x6c}, 0xa, @in=@loopback, 0x34ff, 0x3, 0x3, 0x9, 0x32, 0x77, 0xc91}}, 0xe8) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000300)) [ 2857.629841][ T26] audit: type=1400 audit(2000000748.389:108916): avc: denied { map } for pid=10697 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2857.808822][ T26] audit: type=1400 audit(2000000748.419:108917): avc: denied { map } for pid=10697 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerF\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2857.965309][ T26] audit: type=1400 audit(2000000748.439:108918): avc: denied { map } for pid=10697 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x80ffffff}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64020000050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2858.167472][ T26] audit: type=1400 audit(2000000748.499:108919): avc: denied { map } for pid=10697 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2858.285142][ T26] audit: type=1400 audit(2000000748.499:108920): avc: denied { map } for pid=10697 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caec5f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2858.537516][T10893] Unknown ioctl -1070836927 [ 2858.595705][ T26] audit: type=1400 audit(2000000748.579:108921): avc: denied { map } for pid=10697 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2858.759036][ T26] audit: type=1400 audit(2000000748.619:108922): avc: denied { map } for pid=10697 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2858.876901][T10903] audit: audit_backlog=65 > audit_backlog_limit=64 03:45:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xc5\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x90ffffff}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64010600050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caf15f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) 03:45:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x1a\x04/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xf8030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002000050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824caf85f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xb8\x04/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64022200050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2000, 0x0) 03:45:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824cafd5f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x02\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff030000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002300050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2862.149957][T11252] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2862.277871][T11252] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2862.325703][ T26] kauditd_printk_skb: 232 callbacks suppressed [ 2862.325719][ T26] audit: type=1400 audit(2000000753.369:109144): avc: denied { prog_load } for pid=11253 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:45:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64020000050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x03\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2862.503886][ T26] audit: type=1400 audit(2000000753.399:109145): avc: denied { prog_load } for pid=11253 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2862.705715][ T26] audit: type=1400 audit(2000000753.429:109146): avc: denied { map } for pid=11256 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003500050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xffffff80}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2862.906120][ T26] audit: type=1400 audit(2000000753.429:109147): avc: denied { map } for pid=11256 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2863.055637][ T26] audit: type=1400 audit(2000000753.429:109148): avc: denied { map } for pid=11256 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000008) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0xa040) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0xfffffffffffffdc5) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x3) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x80) listen(r0, 0x7f) [ 2863.254324][ T26] audit: type=1400 audit(2000000753.469:109149): avc: denied { map } for pid=11256 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64010600050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2863.481958][ T26] audit: type=1400 audit(2000000753.529:109150): avc: denied { map } for pid=11256 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x04\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2863.601470][ T26] audit: type=1400 audit(2000000753.529:109151): avc: denied { map } for pid=11256 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2863.738071][ T26] audit: type=1400 audit(2000000753.579:109152): avc: denied { map } for pid=11256 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64013700050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2863.936835][ T26] audit: type=1400 audit(2000000753.589:109153): avc: denied { map } for pid=11256 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xffffff90}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002000050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x05\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) flock(r0, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x1000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x100000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64035800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64022200050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\a\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000008) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:45:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x200000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002300050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:45:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64035a00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:45:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerH\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r1, 0x104, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x6, 0x9, 0x6]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x2, 0x5, 0xff, 0xae2]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2867.383478][ T26] kauditd_printk_skb: 260 callbacks suppressed [ 2867.383494][ T26] audit: type=1400 audit(2000000758.429:109390): avc: denied { map } for pid=11832 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x300000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:45:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003500050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2867.636790][ T26] audit: type=1400 audit(2000000758.429:109391): avc: denied { map } for pid=11832 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:45:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64035f00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2867.835657][ T26] audit: type=1400 audit(2000000758.669:109392): avc: denied { map } for pid=11840 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerL\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2868.021545][ T26] audit: type=1400 audit(2000000758.669:109393): avc: denied { map } for pid=11840 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2868.185650][ T26] audit: type=1400 audit(2000000758.669:109395): avc: denied { map } for pid=11840 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x400000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2868.326669][ T26] audit: type=1400 audit(2000000758.669:109396): avc: denied { map } for pid=11840 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2868.492069][ T26] audit: type=1400 audit(2000000758.679:109397): avc: denied { map } for pid=11839 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64013700050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2868.616021][ T26] audit: type=1400 audit(2000000758.679:109398): avc: denied { map } for pid=11839 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64036600050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2868.850252][ T26] audit: type=1400 audit(2000000758.679:109399): avc: denied { map } for pid=11839 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerh\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080), 0x1) [ 2869.022580][T11961] audit: audit_backlog=65 > audit_backlog_limit=64 03:46:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x500000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64036900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 03:46:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerl\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x600000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64035800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64036a00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallert\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x700000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:02 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0x6, {{0xa, 0x4e24, 0x7fff, @dev={0xfe, 0x80, [], 0x26}, 0x1000}}, 0x1, 0x6, [{{0xa, 0x4e23, 0x6, @mcast2, 0xcc}}, {{0xa, 0x4e24, 0x21e6, @dev={0xfe, 0x80, [], 0xe}, 0x80}}, {{0xa, 0x4e21, 0x10000, @mcast1, 0x68b4}}, {{0xa, 0x4e23, 0x87, @mcast1, 0x1000}}, {{0xa, 0x4e24, 0x4, @mcast1, 0x8}}, {{0xa, 0x4e24, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}]}, 0x390) r1 = socket$netlink(0x10, 0x3, 0x13) writev(r1, &(0x7f0000000000), 0x0) 03:46:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64035a00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerz\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64017000050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xa00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x14/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2872.395958][ T26] kauditd_printk_skb: 241 callbacks suppressed [ 2872.395972][ T26] audit: type=1400 audit(2000000763.449:109638): avc: denied { map } for pid=12116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64035f00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2872.603426][ T26] audit: type=1400 audit(2000000763.459:109639): avc: denied { map } for pid=12116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64029400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2872.815650][ T26] audit: type=1400 audit(2000000763.479:109640): avc: denied { map } for pid=12112 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2873.005748][ T26] audit: type=1400 audit(2000000763.479:109641): avc: denied { map } for pid=12112 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x3f00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2873.196777][ T26] audit: type=1400 audit(2000000763.499:109642): avc: denied { map } for pid=12116 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000002c0)={0x10000, 0x2, 0x8001, 0x1f, 0xf, 0x100, 0x6, 0x9, 0xfffffffffffff000, 0x8}) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl(r2, 0x6, &(0x7f0000000240)="ecefb3593fd81e8554d2def830996da58e435e24b8724a6fea31da9e69efa2d5d1a168dfe7541cfe06") getdents(r2, &(0x7f0000000140)=""/220, 0xdc) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) [ 2873.365647][ T26] audit: type=1400 audit(2000000763.539:109643): avc: denied { map } for pid=12116 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x04\x1b/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2873.545691][ T26] audit: type=1400 audit(2000000763.549:109644): avc: denied { map } for pid=12124 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2873.755711][ T26] audit: type=1400 audit(2000000763.549:109645): avc: denied { map } for pid=12124 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2873.895233][ T26] audit: type=1400 audit(2000000763.549:109646): avc: denied { map } for pid=12124 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2873.932040][T12238] audit: audit_backlog=65 > audit_backlog_limit=64 03:46:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64036600050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64039400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4000000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00 /\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64036900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64049400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:46:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4703000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06i/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64036a00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) write$P9_RWALK(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x16) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000100)={0x29, 0xf, 0x2, 0x17, 0x5, 0x800, 0x5, 0xb7, 0x1}) 03:46:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4800000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x01\x7f/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64017000050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64059400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x04\x80/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x4c00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64029400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64089400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2877.424994][ T26] kauditd_printk_skb: 270 callbacks suppressed [ 2877.425009][ T26] audit: type=1400 audit(2000000768.469:109882): avc: denied { map } for pid=12545 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2877.603059][ T26] audit: type=1400 audit(2000000768.569:109883): avc: denied { map } for pid=12545 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000100)={0x4383, 0x200, 0x6}) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 2877.855690][ T26] audit: type=1400 audit(2000000768.569:109884): avc: denied { map } for pid=12545 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6800000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06\x93/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2878.105761][ T26] audit: type=1400 audit(2000000768.649:109885): avc: denied { map } for pid=12545 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64049400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2878.310401][ T26] audit: type=1400 audit(2000000768.649:109886): avc: denied { map } for pid=12545 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2878.483810][ T26] audit: type=1400 audit(2000000768.709:109887): avc: denied { map } for pid=12545 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64109400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2878.745686][ T26] audit: type=1400 audit(2000000768.709:109888): avc: denied { map } for pid=12545 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2878.925701][ T26] audit: type=1400 audit(2000000768.889:109889): avc: denied { prog_load } for pid=12603 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:46:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x6c00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2879.106627][T12648] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2879.115676][ T26] audit: type=1400 audit(2000000768.909:109890): avc: denied { map } for pid=12606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06\xb0/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64059400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64e09400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = dup3(r0, r0, 0x80000) rt_sigreturn() eventfd(0x110) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000000c0)={0x1, 0x5, [{0x7fffffff, 0x0, 0x2}]}) 03:46:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x14/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7400000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64029800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64089400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xd) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x90800) sendmsg$kcm(r1, &(0x7f0000001540)={&(0x7f0000000100)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)="680ddb544649dca4e1fa2444e1c3a1738b8aad2b41aca0677228c62972", 0x1d}], 0x1, &(0x7f0000000200)=[{0xb8, 0x10f, 0x1000, "95ec7a64032b3f6babc75d7376803cb4b25beb788bdb33ba58bbfb319eb949559c9e4a2042aeaab763abd619940003643393d6a77b10f9e6eb6008f86d8f1a3c6be8289ca6936f46d9eefa90fbac75501f39961d15d0592c2485ca34bd33ac7efbda8767efcf6ac502a759864c6ad51f59d6b6c996671e96bbaf650dd911ef1fd438671daba74f10dd7ee9e00b07fb80154b535e7b479aab391ad9221614297fac45"}, {0x80, 0x0, 0x9, "505e19753f233efd87afa23ca89c62c743dca9e5b51a0fe403a0feaf907147fc3d07c1fc09e6768d84e54a43b9a9a64b5e89244f2f0a60d77c750f6c506851bbd2f7598a2053b5db8f00119fd4bf058d5e90bdf764ec58b30c62befad917cbfa44a9adeae25e8fc120257b700662"}, {0xd0, 0x88, 0x512, "c24d1199569a3ca5699dd8aa3ce4089ae0f6f0b10ba9880bda14d8290c296f7dbc964ff1378ee8cd93a325681a3d03d5a5cf10b26ce3fb5ca9aede65cd73fd5866c5697fa8b815269b37825f1daabfda139130a246b425233fb6994c1e246833c22435ecf904855fbc164fa465cf1a55f58f4b5708057c16ab622b308dc50a02428cf1406daf5d10d063f2e800a8d23d9cd1a36b84754f559044d9f588d5711485001cd4e23719a87ddd12ab50f31c856ed05d5a482fffd2c929de87"}, {0x1010, 0x1ff, 0x9454, "20f0e316f7d9ddb316205e5aa5a8dcd6665130e8d38bd79f0e853718e9a098d073f18026b0db84535deff6107a9d143f9ef626ffb589ca876fc01022f07c52441ff3098550ca9da258e2333f1e9f8de2b96ddd5794258d22325dac11fb33a03d4a2b63c8a015595aec7236446925353912e27f402e15117ad810e0597c985e60395145fed88c211d257bd956ce6ff1d420a93eed6d84caf5db7960492626a3ea2c23c69f792ca90f96f5f271157af98238cd0175adc43c6839529900288cfb8165c6abdada5b6eb1770ba16d91bc4f5fcd706898a1a761d34ac50bc2ba2baf9eafac526cd9331bbbcb3aef112a979db24b136e9ec4d57faedb44293a06ce4a3e29da6c7269dbd912cd98b72a67347c3290b0896756d841d4398570bc741ae7ff1464d9e08a0f347402d5c914c2cf55b3df57f520245f6cf59a5a2dfed276a7fbb52c7a0c4af942742dba1f99473fac5da5f66f7f95bd1a05f313b52b99a9bfe19795fdde6833fa4c27bfbc3dcef2978d96fe38c5869bef7025e6b7dff2540894c8d302a5bc9f1b73e8da0ccabe5bf66d3aa13902c0259dba74bfb77fc06c489b1004b2d9cd64747c0184016b233bffcdf65692435b0f7b9a4724ddbf05b89f619d75d0d71b7cd5efd51c4df5aad66a614fd8c30341a0c5ee593020c709c83fae7c782f42ab33d70319ffea2e0170c4fcbcd315862efd6808b5cfc04fce40e742181a2dc3945420d7b6e1c03fe568fa7bcbeee56eb4f6cc19807df6c8fbcb2764323882c704277bad59afd4c54db8f4dc87ead5ee658b2b095639ee7192a0e20103d2747a8ff5bdc73ec95900c8fb542e09ac4ebb3a23ac0209410d2a96cc8bcd4d880d675872713126526d5ad3757f2633c87dd06a40d308d25fd8a6dd67c20a7e1724e8a10bee4c601cf7317d0693a78aeed3b82e86268a34f8fcfd46109f166043278acc5ec8f59da7ffd61e4e4f0109ed5c46fe5a87a6daad95fc9fc4794af9591e3359b46a680d7d6946e43bf2b1441cb5ffec2df6aeffb676c98e0837a4b295d79c9062bdeb693387ef37fa9c5f57bb659dc77628b27d79481055a55bf12082738eb3d70cfffda741d5c9c7c3200f1990da88d0bc5a294fe1e8cce1ea5f4276c9bfca23a7442422eb88854a2af4d49bd0236e65fbc67264728ef1fd56a389da57ae218046f743464a19092f532d147170394f0fa3980b67035fce12397e09751eb79613357a9bc16c745f13fe1b7dd7f0633f9a46abb6960ee275ba74948a0ca808e09eb4d5de9b739a75331aa262733849480e0188a78d1ac9a8240149d305fa1db271fa54455392443df36d450cd0c2bc47e764bb0952d39880de2fe69707ccc57af8a7af6696ea64ef36510f48311fa4ce4825904fc45d5b9bedcfba8546c2719e08a1de880c80342585757246ec9798c22d1d31ab21b2475b7f96ac630a9432023bf22a377ee56b4b55735147b3c6cf9d2f725423da66478e69296095e0f1ac565ec0927777458cbf36423938067a0a5f9012017445eaf450c4f8a66c04dd7c57466914c55c9373ffb5f913779e6085ac8a88fcc704961859f1716b474135058d70e65a7acca7e9c8c88e056deee3d3ad632db5f8928a683f86783154ff9ef48bbb479f5a8a5c5b9a6997fc7f60fa0d930ca80b0fcd0c053a57341e75d7eec83e05d63f52018de2c4fd530bf521c134405e740496527e2811c8c0bbcd19371b2fb8188a0d77ada60d000562ae15d837054d017a0e3e3dc7cbb241d0276d19c1b0bc9585ac46f5da622e945aa958fef1f8c593d5d78509c745c59bd6b66e7764f68a23bad9aaf8d196aa819f9ac050938d89e2ccd7cc7b842fc59f6cab65e61f8407977fd18d214b82801b6e7d4bdfddd94d0cbf49ed41d394f7dbf5cf10a20a6d1d7b7b34fc3421eeed245062d1a2a4f280f8e68e0e6de9195aa61a95eb2c135db98986a308d960e01c118184d81bbdd54acb10a95cb573cab328d07c36aeaef655a752d7e31a0fb2697a4dcc24230d598681b904cc184d58f10d20d6d60f1b8eda03eb525ae616358d844890e6113dd8e29ee1a755605cf5fe7b5c8013d9574875d90fc502c7dd3c10e33d93bd7d77b67563ce201c59226081958f6f571eb8d5ba22df1582d9b3fbe654a44360b662cfb1443d13c70f9dff64776860a375b063f319d82969ca46bbb30aa7a6792bbf4b5a462d0dac4278afc69118a76785ca8b35384863c2306abb81d5e79dcb0ab468a997e6432ee9bc39523ba0b43fbd7de57a2b95cbca2266590a6922e267a864388a4f269de74490a1859a885af604a4e0e4aa30657379b93e8cabeecd5bbac942cf0dad600a4f68c90a7da7617584721b96dd4288eee874aa0ded61d7f6410e3e08561c97c1d76bd4aa10e651aaa17a53c39b471697401703520485bf365cbba616d6caf0e8734007a7f9cc8ac5eb9eadbe3c18ad4e3f29258304e84b64e786bb752bd1a14f6b0663b441373d31b20932fd15be597d78f48cf87d14ef6964b2c57ec531ad2288140a2f05c97c3229f567a5f0973ea1a9d49a526f6d8a21d8b50fd7f7af2ba892db0e7b6ed8c1de945a7864e553a4ba535078b429402e7f9e8a188daf4787a08afc1cfd51fc55b68cba70fe2f442d39094bebcdace4f8b331b6437950021ad591672cf4e01f9059cb9fee5c4529d195b8da3a22253448ab89922ec2b082fce0f8a97eddf85753b47b3fd1da4fde3a8256d2e9e478faf241535ebf28562630c9c27c6c8603bc727901af2bb9848b19cbe3c658f8fb73b8f44e93fb4caa295584805a71aa6d9a70eb4ab9742f9c7ad3c948535d19287da5a683c0e978cfe67463c20adc4d54801ff912dddb63c803b4bb5f1d70dd010e5c603e0c8fb4b7198b72cbd1e6991854ebfe85f38cc86a178b9338bda28f7895af8d6f01d8068798ed9ffd9fd316aff0816379212be9e6bdb2f285ceebf1b901963f554ad0dc320570fdddb3d20d4498974c3874453a6dc4c9615385e371a1955d0c185c6cb53b430b3dd708b063360d886d6494a95c51796be41b4d1a369c8798bc1916fa348953d5140d68a0cc3bcc9bcd7615c7660b13442d4bb32b53c595235e68e4e969c1920d233f8f2424852d3ab0bf39d9ebbd21f052301b86d5a8e5231ade39397be021725d5b844bf2805569bc982f77a67c0f9dcf3dbfe61d983af52bb58c8981ddfd852332125edac08af32a199f57c6bb58d55cd86c17c9af2b76600751e632805fc48c2633c881c453b8fddb92cf2bfbceb1cc8acf24eb1fd78a48ba2b0963935a00ffd340649b5c035b9a2c1dc0141e35e62cc82223d7fefa5468ea359756ba870d1df9e9822d29f63348488748e59b8c83e8f26aac50223301fcfefdf20a6c1ae652765eb4e83b1ec7860280025d4c79e4b412725b20d0c02f6022736ba00c7d21fec029c8890e5e652d16917adf882d0e2964861dc90c694b3a588ea377ae93b4ce2a68b07c501b4cb019d9e218adeecc176f2b5dd1097de06b6602b229edd8f782b95c0f67f5393fefbacc957fa4b1b62a3796a77027c800f34fc7f2282878f09579bb9cdf75ecee716a8767d8601780dbf51bf7d7d4b3cb4788d8c7adecec2197d944f21b8621a5770f330b6bbd992ba8527f2cc3f47c470791d6de7a5550523226fc7991858fc3d5012e5aa6dd6724485330598d1901a9de5b15968ffb9398a836a57077571df36646c5985f596f436c3a6ac6843b86577254d73c00fe26fe4ebad804c5a40e3286ef8ac65c22f8ad1f1018ee2d7deaab3787da868af53a18e254e5880a105123a8824e5d525ebe6fa7ccab1b828aa59dbb78e66dade5f92bebdd36946161a3b683ae9dc9103b78f508530dd95211ad27640c858f1d5bb82ca320208e93de91eb4500105e04a359bd12cfd493acef8df55906b5011ed27ac5c493d862e33dc3967609162efd3c6da63b49a40f6275984a575553f0286b6e3bc06b19407c050e648a8161c485cfdd3e52b260199b01aa3c83b149aeeb8c2ff7872c9e71ac195e39e036097c5a89f2208ff10d1a12cc7bbb78628aaf38a4628a565bb10a1a170d2cc27db2db52e7d0f070154e6f20a3ce7efbb82cf818bf1efb6aa003eb8bd7f4843204240337ceb0f2891ddec3239d2f56ecb2f9ee5ab622f7816074b44b30d885d75548efa5c0db66e10577bc870464b90dde19a417da6bdc68904fd84578beede543c1cc083a68e21d568986b695639fb481a0a8352b22ca6b6708f51470d93429e50fe2dc97406d3e167b405e530df20eb96cb16a81c5577d3c985da20a54bb0cea81958a4ce0a32a4bb0a26f4c88fdef05ac8ddc91f13bd0a4f9205f7dc1486430376c9d173785abebc9ea49fae579cb8c338bb25dc65ff8afc2c70ed44099f75046c9539d435a2f1ed40f9975195188a72831a5d37a88994b8eed8ffebaec2500c9621050253e7f725289decde355b49b4560c83e0967c9b40869f64148458e2fc397b5b2eac64eeaccc6e0081ffc1509e29e588821e21985976f48b26004571b0d9fccc1da6b4ab1ba02ce4dd9b7e1edebd8ea3958849d8775ef13a5f8cbffd37678fe871ed717d257d314cccf3042bd7fc1cb2f39b79cf55a4e2bc4c8ea8e3f47fccb2ed842da83563673ff1c10bc046b9ad716af22c1239e8651b077b6745c16be0f29f16c2429571ae847a71033f3582f7a8377cc8060df120412030cab8dcebcc95486f98fde7d4c320da42655e9c055c85543dba5cc795cc9dae52b7adbeb382e0b1ad82fcd426fb79cca9a9fac51659ccd6208ee0780b74c5c0c905a9fd5266e127ab6d13d5af0622849124279f0f1ce7e8be5aa99b2ce8eed326dd6165fca2fa57d5c1a2acea36aa07ecbf7d8ddaf24e5a971f3ec5b79df3e4200321e863d284aa8b1d3279fa93bc36dd966e2cb45442f4c30c6fcbcd41adb799c3594c93ec0ba29c99aecf69692e223f4832ccb8f371c8388781abee3ab0950023566c0b6907b22c2d57ab87deb5a1bb59c872da1b2ed265aa34f38a1664c85f46504f3115ab37c912838e0258bb56984948e002e997a055afd73029d93a6358d53f5bf6169e365942309e796a867b2b78e4b3604e8ec1ff16198d392bd0c41ce0b65cc9cec09c381f1210cd7b0d6cdf3e4e68c56baf3639814c72ae5790b57d7842041dbb17c708c539ea9f004d459fc96072db2b75f4e4a5aca5eba6d2371ae4379e68d09050437d07384fbc87467fdfa0aa11128f504760bddf2dc78ab39751b3da1304c683fd890c8fbf5eff990cba85b502c10a2d241fc62142fa8f6b093d92f45db95696dcca218859ba2fd302e377af4917cca22f37ea255ecd7db27b12347c4814222e3d27245e19febcb05660c1704183fb25d3c476cea01304b5e72d0a927f9638d59710c5d5206ee400467e151dcde4ab3381a189d27f4ca848169580b06feb5b7521c2d5447166963d7774ad2b78a91a29b018a7d57135b705140f7d5480133c02ffa75b7ce4792da1dfdd277ffa3b29c2c84a590a85d87278d414ffaa49b80ab6088c16ce2122c211c8bcadd4fbc5f2849f0ed33b1ad0207e1058964c4f7073e59dd28d81791c7124ac69703cfaee34ce1a90349d04dd6ad9fe1d8e642cf1d43ce33434e4da9794345d9226da33dfeaf702de0107f4751fb8aeb6a7d82bf3e8a58a37f57527657f209f20dc9211359214e176555e71488d46b064497452336fa263d1d4d46c08d56a61f8a01f6e966ec94d7becebec0dd2ecb388593552c63e7633163e71626c59e25c5559bee6c28afbd1f6dc8326ce168dc"}, {0x38, 0x13b, 0x7eb4, "9b3e1b3940ca37eb38f320ba660cde0a894805b365707c43fb426d7626eec82477faef59"}, {0x98, 0x118, 0xf159, "5a572f2d54bd85b63313f1ac22cf50283e1685055dfcc30a75b961ae6f80893fb9a0c4bd6cfad5c95915b4bf6f50bf69ace4272fba76fc6bd59d08e1552c639fbcb8a6ced3cb10218023a3a183c7653cfcc381dbe3fb6d33c6b5d01acafa644954ba6e3cc3cc8a00831cabf720f298303a1e8cd5b26ede11c09ac8a04c6cf3572b195d581f8be950"}, {0x48, 0x117, 0x100000001, "1b102abe6cc7ccc25c2b324251a6c4249fbac3adba6ef97393d6bf66cf352960937716be1c7532fef59a7783d6967b6038"}], 0x1330}, 0x800) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:46:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\a\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7a00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640a9400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400a900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/%\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) timer_create(0x3, &(0x7f00000002c0)={0x0, 0x3c, 0x3, @thr={&(0x7f00000000c0)="1eda8748ca27309db34775977fb0d4dfa5d30d8f4946f2e57981b7955b052dd64fddf568a233b243da73d890d9f9423814d05c3bc647ea51e825ca67f5b64598c19c6d1321a4714444fdafba06b4cd2b075258e42b7463736ea9a8b1e5f17d6c00bda823099d4fdd805fe8d15ce4a84a21a87d045f29f77e38038afeb08185b68f3778786afe8b866fd8d3e48f374f3ba23a78fa075c685b36275d28d1aa4c53b5c7b0e76fb38068b9a301b2a0ee30ff6930f1c1d4a5351f0215a9455964f11695fef127d9a9b8e6ed6db025673fc816aed1a525aee1b51f08ecaad518dbacf81373068df98448bb1d89623c1d2a9c43", &(0x7f00000001c0)="f4d7ca82ced968518b5da5067a0f86b05e955294f38c09cab3913e92865c478a456838ef630995b052d17b5b647c3e468a625055269f4f6f309bf129c8156b163532d91fea37fb2d3f9db703cc801a84c1ac428ae594569bf155bddbbc93b0f688e66c52ca79d8167d3d087a55855e818638e8fa1aa7829a55d3b542a5aa1642ae8106615a5339c19741dd6ee703c16d3a7159ffc1d84db7496d0141ef62745ea832e0faf65b0ce1b43abb9beff75ae147cdd36c8adc5acbffab980f895078498bca6a21b32f6e741c"}}, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000380)={{r2, r3+10000000}, {0x77359400}}, &(0x7f00000003c0)) 03:46:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x7f01000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640e9400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640ec000050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2882.448952][ T26] kauditd_printk_skb: 260 callbacks suppressed [ 2882.448968][ T26] audit: type=1400 audit(2000000773.499:110107): avc: denied { map } for pid=12860 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2882.576955][ T26] audit: type=1400 audit(2000000773.499:110108): avc: denied { map } for pid=12879 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2882.693707][ T26] audit: type=1400 audit(2000000773.499:110109): avc: denied { map } for pid=12879 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2882.955776][ T26] audit: type=1400 audit(2000000773.549:110110): avc: denied { map } for pid=12860 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1e\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2883.187938][ T26] audit: type=1400 audit(2000000773.559:110111): avc: denied { map } for pid=12879 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x8004000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2883.395631][ T26] audit: type=1400 audit(2000000773.559:110112): avc: denied { map } for pid=12860 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ce00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64109400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2883.563498][ T26] audit: type=1400 audit(2000000773.609:110113): avc: denied { map } for pid=12879 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2883.747188][ T26] audit: type=1400 audit(2000000773.609:110114): avc: denied { map } for pid=12860 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000100)=[{0x28, 0x0, [0x5b3, 0x6, 0x6, 0x0, 0x11e, 0x7, 0x6, 0x8, 0x80000000, 0x321, 0x1, 0x80, 0xf733, 0x5, 0x6]}, {0x11, 0x0, [0xdd, 0x8000, 0x1, 0x7, 0x4, 0x5, 0x903, 0x8001, 0x10000, 0x235, 0x7, 0xd0ef, 0x400, 0x7fffffff, 0x9464, 0xfffffffffffff396]}, {0x1, 0x0, [0x7, 0x81, 0xdc, 0x41, 0x4, 0x80000000, 0x4, 0x20, 0xe3, 0x4, 0x400, 0x7f, 0x5, 0x6, 0x8000, 0x3]}, {0x28, 0x0, [0x1, 0x8, 0xffff, 0x7fff, 0x3f, 0x400, 0x5, 0x4, 0x8001, 0x17de, 0xe0, 0x5ca0b500, 0x3, 0xf72, 0x5, 0x8]}, {0x3, 0x0, [0x9dd, 0x2, 0x23bb, 0x8, 0x800, 0xfffffffffffffffe, 0x6, 0x6, 0x7, 0x8, 0x3f, 0xda, 0xfffffffffffffbff, 0x0, 0x6, 0x5b3a]}, {0x1, 0x0, [0x8, 0x5, 0xffffffff, 0x6, 0x6, 0x9ef, 0x40, 0x1, 0xfffffffffffffff8, 0xffffffff00000001, 0x3f, 0x11, 0x6, 0x0, 0xb83, 0x1000]}], r2, 0x1, 0x1, 0x1b0}}, 0x20) [ 2883.917613][ T26] audit: type=1400 audit(2000000773.609:110115): avc: denied { map } for pid=12860 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x02E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2884.070610][ T26] audit: type=1400 audit(2000000773.609:110116): avc: denied { map } for pid=12879 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x80ffffff00000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64609400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6401e300050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x03E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0x90ffffff00000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64e09400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ec00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:16 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x8000) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000100)) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:46:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x05E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xf803000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64029800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f100050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x06E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x980000, 0x9, 0x9}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2}, 0x8) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xff, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x27, &(0x7f0000000100)={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0x1}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x4, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e21, 0x69, @local}, @in={0x2, 0x4e24, @multicast1}], 0xa8) prctl$PR_CAPBSET_READ(0x17, 0x12) setsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000240)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) 03:46:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400a900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff00000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2887.577171][ T26] kauditd_printk_skb: 249 callbacks suppressed [ 2887.577186][ T26] audit: type=1400 audit(2000000778.629:110357): avc: denied { map } for pid=13455 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2887.610732][ T26] audit: type=1400 audit(2000000778.659:110358): avc: denied { map } for pid=13455 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2887.752358][ T26] audit: type=1400 audit(2000000778.659:110359): avc: denied { map } for pid=13455 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2887.893449][ T26] audit: type=1400 audit(2000000778.689:110360): avc: denied { map } for pid=13455 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6403f400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\aE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2888.023194][ T26] audit: type=1400 audit(2000000778.719:110361): avc: denied { map } for pid=13455 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ce00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2888.212256][ T26] audit: type=1400 audit(2000000778.739:110362): avc: denied { map } for pid=13456 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xff03000000000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2888.366648][ T26] audit: type=1400 audit(2000000778.739:110363): avc: denied { map } for pid=13456 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2888.532561][ T26] audit: type=1400 audit(2000000778.739:110364): avc: denied { map } for pid=13456 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2888.705220][ T26] audit: type=1400 audit(2000000778.769:110365): avc: denied { map } for pid=13456 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x4e) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000400)={0x4}, 0x1) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000000) r2 = socket$netlink(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='ip6tnl0\x00', r1}, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) bind$can_raw(r1, &(0x7f00000003c0)={0x1d, r3}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000440)={0x1, 'ip6tnl0\x00', 0x4}, 0xffe6) 03:46:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\bE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2888.933181][ T26] audit: type=1400 audit(2000000778.769:110366): avc: denied { map } for pid=13456 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6401e300050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}, [], {0x95, 0x0, 0x0, 0xffffffff00000000}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400fd00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ec00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\nE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x6, 0xc000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @local}}, 0x357b13f1, 0x5, 0x2, 0x1, 0x812b}, &(0x7f00000003c0)=0x98) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={r2, 0x83, 0xdd, 0x4, 0xffff, 0x800, 0x9e, 0xf3b, {0x0, @in6={{0xa, 0x4e20, 0x100000000, @empty, 0x3}}, 0x400, 0x80000000, 0xa5, 0x56, 0x1000}}, &(0x7f00000001c0)=0xb0) r4 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)="1bf30dced2f5fffd27a629e87857629f6eeac2773208", 0x16, 0xfffffffffffffff8) keyctl$update(0x2, r4, &(0x7f00000004c0)="68f7d03dbb28193513cd416fcdaf855f13ed65b663a11b41f1f237d7e3b88cad343034287ff2c3ca954f88ade178cd7556119b1b7a605367ac2269c2665add2e0d517493bb1fc13931a364d10fd6b113e94412c5", 0x54) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e24, 0x5, @local, 0x1f}}, 0x5, 0x7ff}, &(0x7f00000002c0)=0x90) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) openat$cgroup_ro(r1, &(0x7f0000000540)='memory.current\x00', 0x0, 0x0) 03:46:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='\"yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002300050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f100050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x12E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003500050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='#yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x14E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6403f400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:23 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80000, 0x0) socket$netlink(0x10, 0x3, 0x100008000000004) socket$nl_generic(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000001000010000000001400000", 0x53}], 0x1) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000100)={{r1, r2/1000+30000}, 0x1, 0x8, 0x1b}, 0x18) 03:46:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='%yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1cSE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2892.587201][ T26] kauditd_printk_skb: 243 callbacks suppressed [ 2892.587234][ T26] audit: type=1400 audit(2000000783.639:110610): avc: denied { map } for pid=13843 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2892.784966][ T26] audit: type=1400 audit(2000000783.679:110611): avc: denied { map } for pid=13844 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2892.958858][ T26] audit: type=1400 audit(2000000783.679:110612): avc: denied { map } for pid=13843 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2893.166068][ T26] audit: type=1400 audit(2000000783.679:110613): avc: denied { map } for pid=13844 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2893.361624][ T26] audit: type=1400 audit(2000000783.729:110615): avc: denied { map } for pid=13847 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400a900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04\t\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='*yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2893.500199][ T26] audit: type=1400 audit(2000000783.729:110616): avc: denied { map } for pid=13847 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e40)={0x0, 0x0}, &(0x7f0000002e80)=0xc) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000002ec0)={0x0, 0x0}) r5 = geteuid() r6 = accept(0xffffffffffffffff, 0x0, &(0x7f0000003000)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003300)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003500)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003640)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000003740)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004a40)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000004a80)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = syz_open_dev$dspn(&(0x7f0000004bc0)='/dev/dsp#\x00', 0xd1b7, 0x0) r14 = accept$inet6(0xffffffffffffff9c, &(0x7f0000004c00)={0xa, 0x0, 0x0, @remote}, &(0x7f0000004c40)=0x1c) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004cc0)={&(0x7f0000004c80)='eth1*:.posix_acl_access)vmnet0}\x00', 0xffffffffffffff9c}, 0x10) r16 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000004d00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r17 = openat$zero(0xffffffffffffff9c, &(0x7f0000004d40)='/dev/zero\x00', 0x40, 0x0) r18 = syz_open_dev$mice(&(0x7f0000004d80)='/dev/input/mice\x00', 0x0, 0x0) r19 = openat$random(0xffffffffffffff9c, &(0x7f0000004dc0)='/dev/urandom\x00', 0x410100, 0x0) r20 = accept4$rose(0xffffffffffffff9c, 0x0, &(0x7f0000004e00), 0x80000) r21 = socket$inet6_sctp(0xa, 0x1, 0x84) r22 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000004e40)='/dev/video0\x00', 0x2, 0x0) pipe2(&(0x7f0000004e80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004ec0)=0x0) getresuid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)=0x0) stat(&(0x7f0000004fc0)='./file0\x00', &(0x7f0000005000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000005480)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r28 = accept$packet(0xffffffffffffff9c, &(0x7f00000050c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005100)=0x14) r29 = socket$isdn_base(0x22, 0x3, 0x0) r30 = openat$uinput(0xffffffffffffff9c, &(0x7f0000005140)='/dev/uinput\x00', 0x802, 0x0) r31 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000005180)='cgroup.threads\x00', 0x2, 0x0) r32 = openat$tun(0xffffffffffffff9c, &(0x7f00000051c0)='/dev/net/tun\x00', 0x103400, 0x0) r33 = syz_open_dev$amidi(&(0x7f0000005200)='/dev/amidi#\x00', 0x80, 0x502) r34 = openat$dir(0xffffffffffffff9c, &(0x7f0000005240)='./file0\x00', 0x1, 0x40) r35 = accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 2893.699541][ T26] audit: type=1400 audit(2000000783.739:110617): avc: denied { map } for pid=13843 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 sendmsg$netlink(r0, &(0x7f0000005380)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfd, 0x40000000}, 0xc, &(0x7f00000049c0)=[{&(0x7f0000000140)={0x60c, 0x17, 0x2, 0x70bd25, 0x25dfdbff, "", [@nested={0x258, 0x68, [@typed={0xc, 0x2d, @u64=0x7fffffff}, @generic="4259cf547058657dbdbc0aa11f446b4e45c314744e7079e7632145c5dfc2cab5b5b1a7027c158587f3005b64b19c8f87bedfa79541c6ea2afaaef89a84dffb7e2c367e87af9bbe0a24cbbc1001ef73be3a0c67ee6e0573bb0ea32b39b312bd895f9d758e7429f821b099e3b2d917b2d4439c6adc0749f0225322da27d51f3fb3708756fbd07a242a5f7ce9eae8fd6963de4ef6038bf6d631366ee8e3369d66167272792367cdaed73c2ec69de836b7a940e321c3a2742edbe4c8d831b3c3", @generic="d919f0f99a98b26060d0f4fd88f4a55c88c9e941004a4eba5db30b7b7076b7b8be19128e30610439b84b56e3ef0db9ce78d0efc5928241389bb1b8d8ce493f8863ed9aa6a8a12b5ab4656170df2197e5456e809c85a95a7875d8bbd5908f1fd111bdc4179b91b3815ab5ffa2ca0f1f44c065141f4071d6db091c4f71806f8486bb074dbf2a3f428c991de35dfc1204ef8739f580834425a659202508d22c2ee654417bbbaf74406b93033e2619c9212b7adf6781ab01dbd93d4718e30e4031c70766002b90f6d19a21973138713bba13c3ee031d3a3d8a843cabf63c5c9025839f8728a6f0c7e507e882d1274962fb0630a01195", @generic, @generic="c90ccc81cf746674feda94568ef0b881a77b1348fd9ec701abc739a2fce783635682df045aa1e62b03e26dd49e5b0cb9a737149c3bdc58051376e205888cf96a750ac7e1865ea7bb0fccf066ea7fb6bff3efce34f5f501d6cd1f97a190c3d8e1ee47dd79ca54b6db451f08f228d9e551f2a93c0f9da8a935457624c5ee8851", @typed={0x14, 0x34, @ipv6=@dev={0xfe, 0x80, [], 0x13}}]}, @generic="918df7aa17faf50bfb7a8a07f0ba555dbfdca94ee60002e1b0fa3f69732072f1fbc990eb3596d762b059e201f0cf7fd2d27d5c7c0633f4db35a1f9b47295fe116e9ca8c616baf18093bc1c1033ef67f1924a9d9fdb446256414dade6af1bcb32ea8ef52d19abd688332235e4e5d3c2997bbf143a8d3950344da158e0bea1c56cdf427b47cab7aab1cadf57c7bac6b884f5c2d226ec630278d06e4b54ec43e3a898e9b7fab89f0b0d44efef449e2b0eae567c6de025b941b7539653acc17122697f6b5e84facc4ab257e773b7743b28ce0ef1cf67b74a02f194ccdf763c82d5531da01c466a57ad858df0cd6320f3c85bc1bbc476", @typed={0xc, 0x78, @u64=0x6}, @generic="c4ed0c358d3658931ce77ca802e22b33a04c4355a9715cea6a2988a09acb40782ff7407977b96bcfcff993f183aebfe12c7de8183118b0fbad1110133f37e69c9deddd0efef785137a23f61cba19bc5bd20658478a9e7719182338dfef2a87cb20e400ebbb7767557f13de011f736649a5a15a17698c72484fad06fe3c79e240c03c69138d7c66846721f069ccd2df6e0c3e9c52cb48fb17c80275d97c72f8e00c6377e73e23c7aba8e411c6822fc08fa7c29ea7f48f161639a79a313f4f67128580c12330371ca31f", @nested={0x68, 0x73, [@generic="86ff71d9efd0bab9090ab4318554ea4fbf7b9624bb7f21828a1b09b3b93f3528e2ff5bd02061d532a67b60b5f81249b24198f2c6a19aa73aba2bd88beb4c29486251dd71a9d8af4acb41dd062e8a5fa4c7e3f3dc5676116081221f1a5ec9ac150cdf96"]}, @typed={0x8, 0x87, @u32=0x7}, @nested={0x168, 0x8, [@typed={0x8, 0x71, @u32=0xce8c}, @generic="7e0ad379959ecbd3d5b121e6e29bb5b6d0c99f85cffce904527e3b79bdc7c36e73391e2cd9d0bad5", @typed={0x8, 0x6f, @ipv4=@empty}, @generic="02d7697ba685c62f1de587650c4bb76a666bc71097bc51c5ce288cd0ad5ac4af", @typed={0x14, 0x78, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @generic="71d190fd61c1f3fdc5cb5ac610aa843a87e18bc51e4db8f6ceb2a3e1a66c0c2c02f4a03e3b025e3ebca4371b3b2a2616f7a82e7ac60d0e0a279dceb65760bd18088f65f674b3bb5c460cf82b3586758be3d3bfe0bc9d79ab809ba817021543ce9afa6ad6e04ab847faf69357cad8cfa5a84e960f3500a7f2fc557d6a0d2ef013441241957b12d1566f010e2e3e74cf6c99084c630bcd42c3ced87cb1b4b622a4d59fef92a892731361de4403ccf29a5d9c068485ca5c90087ebcca31cf6754abd578be1b8449326c11b757724d24022f3dce43ef3fed19da1b94c54eaddd0ebabb5da17e3083965990f392307bbd3c81458fe14fc1"]}]}, 0x60c}, {&(0x7f0000000800)={0x2628, 0x2d, 0x401, 0x70bd25, 0x25dfdbfe, "", [@typed={0x8, 0x59, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="af441d534b4fca9f49234dc8e16e7d34dfded9d11aa50ebf6821603f4d598faf53361884ed4f253284240599443ac551eb06be4378bfe13746e02e77697c3b55b122b647c922854a2952766f74c61c791d73d38c88e4dd77780f91d0c853d28723e56ee3e8258ec5822d6dd972f1163cc85a1700bab9c350afb4e83fec9c7d2347f291bd502f3544b7759c6fca89723ec525ec", @nested={0x28, 0x48, [@generic="3bd8be73b48769f4fc21c5b17b08bf0c2c87b2e883f2938901d8c7232cfc381ba84250"]}, @nested={0x21cc, 0x1a, [@generic="4452629fd836fb60aaee4608c2b8bc69d90709c032c521c09833d5dcdb6082ef87180f4e1b8ee7f34bf43e5402294b4cbf2d34cae2d8e88f440a32fa92fc795f50010aeb7cd72078fa0dd39179f2936bdd327600ab306a08bb748b93ec4cbd314f12070ef5bedf22944618025e10948b62968af8ca594aa755939824451c1f1cfc1d2ee34abdc3c4862bb1b52c19fd37b54899e9843113573d861d9bf7652188df84a287ec778a843935e8ca207fea41714fcfa2e38e79a40d4c2e94bf884595255d365f574b990c", @generic="e36ac11cca099ef491b448be5851910c52947f3fdd00fe134e1dd1b449027cc55390c6bfaa4733db9921ba35e6fd", @generic="a69f9fddb0ef3e4d18f0ae76843fc5bd791468679536ecc03bdfbb812a067e4f877f83ed39405bb596aa843d45e16641ed92b8f43cab1b3f8be9d1d732380d196f96ee9af99c3bee863f7966c0c8a18c8a868faadb0d3e8c310bb96f3933d3a249914c5efbe19d78b4f88f7fb1be7f32407d8ce11059e46681ce13d741e670d8d2044afb900f92db7c4d529d70e9bacc8d0db0cf611a717a32155d0de7d3f39223a94ddc158f19b48f92f07b799dc66bf5861475bef80890d612aa0fa93ece2d05e5d1d6", @typed={0x8, 0x96, @uid=r1}, @generic="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", @generic="4795eb13f1d0be4fc806ad2da5568ef0fc38693cf6243ad838bc7f9a88465b1561a0f4a399ec50e98e1d2f9707875c1b1433e8953c375278a7cb73291bad5ef65f36f1e8980da6241289cd273819aaba6aa8e6f70e6988f0727bb55699b3b515b9e5349afb3ba761daab6540475e08348fe2f37fcb2a5a0aaf681fc28de82b34201f910dc6e743e08a6522a364810889b925fa02ecba98846ff11e5d71de269a86683311d0a498cc7b4ac1572cc983daf3242abb07a8fca1c641eb0715d339ec5699445ea95c511e06ed6e4cf8e3a704eed69ab5ce4ead19831e4eb948c32451586703872e8c75e6c981821530a9e894faae5acc133e8f9e88b88a6b9279f919313dd49290bd81459a1255fe5f01265514c970415de2c657118c56c9bf8a2b05db5e4baca34053b6de5277a221629e36f9510b588cf9869326bd9fe2a12084bdcdffdb9ea3900ab20698f9fd279855c17d56e8c56aba92829d55a4df397b86653693d99635b57ea83df53bc2232eb85f1eee394765752f662e38f8637313821d83039a3624760392ce9ede75e3cf234cc44f6c9ba4af2fa1574c87ba5a483278abe492cbe5214b6195dcac5af6887fbcce5bbc01dcf545f777c0fd6a107f782de1378cb497437a2ba02e2855fc6b12f9e38386f1087ace279df3a582c244deecf114f9cf7d6c6bab3dc34123d77167edcd40eaa587cd3ad69313cab42fb54d28b36459d83ba06a86704a6cb9d214fd67f25b8ba239f4398a19c90805a9478a88b6df53dc34792b674685186e31488b30bd0e3440788447f0f7f3caa7c767b8825cc6d6e8d5e12446868856573f8ee59af7b21a9a69f1b353f39ce9c1c992a39d566869d995290a5b894a834a35c86c829da0cfd0bb6f8eb765bd8fc3097f4319ff1392d333b55ebd835dd000ebd02e97506c98d66d76efab5e42c7f92242c58383b63705a94ad3422b2473bfd405039c2091dca0356d11bedd4b33450eab9d38a102f5b73c83561fa2dd0044c918b3080fd5b657dff24d2994c0f1b53d279f321974914dd94b5b588dbf960a03cacd9711eb16e68a16f0db9c5c21b202fd0ced560052ba4a209ab621546af77eb390404dde206081384231c85b52828d0b00540136b935fe8b124078871501e9514c785e5095212be293ae85943f6132559ae397c09563cded6a11717908fb50affcb331b693ea276580acff11f4e8d038a817d7cb45ab57eb364d65489b49c2efe7b767c7aac7bb5c801ce7e01443d461cd48e0e94c73100e256d0adc5fb126a7b63d6b0b6c1ecdba49857b224072206f8dfc962c0a3b667829f643583fef92780343d96b7ba2c03ccd7197d003ad3a5a6a3a2ffa281156b3164fb3190e5673c60bbc27db4a5a2d6ce985589b4074584c36370baa0bdacde3841cc77236d58461746381861035fc09edb2a51579f1533642787ca4b6fb07d67785b748b6173b82bada4812022eaf8f1711761ebf7b76f7e07177d993b8a4fb63e25ff0b14fed9f05e4d78728c1b0cdb3af331e0ad745c73d3d8c5820128e968dd071c6b816d29942672381661d3007c4fe253c2e38b19dd7af178a8fcf8a91ebf0f66ccac6fdcea09b72626d7f9f917650166d4d45904c779d97bba3de41e7c3c7a1ff4f458c5f918a561529c5f858ff1d60d5842619df2a120441f342fff101cf0dd1797f01050985afb1c6732c1acb1c922d19098135165aac434511ccca9756bc1b1a3976a7dc08daffcae480e56b7c0c43dd17d6b7e00ad0b9ae7d108c2a6ce2289b2b4486e387a3a3807951bd8fe35e8f6c59184ae4f819b98bb97fd04b18d619d44df657d2630a5845eb68199455d1ea8ec4c2d9ba5cdd3eca3eb106afbaee776389942afff0462e3073aaf225f7a351a6ef768cd11f5969d5020d0b26406eca290da2125e4f28a23eaa287e722a2d9279ba14de879868753cb13dcabee5538f33aceb41de248e38ea1107cdc2b44c49ee57d2fe22a1d22b986c0ab2d1eed82b6f3796dcc5d6ee2cdccec1d495495be060829a2642284bec78f6b2626a709769d0d5d515925bc9982b1aa77f9d00e002ba4ab8aa1ce050f45c1e5f636730652e76dcf869ed7e21560a016d4de67e37d05eef9a43efbdf12773dbf2a55275586bf403bf8cf44b163cd77c385911a58f229bbc9bd2837ab3addfe7f17ab3d23b9e7efed11c8dbe63955c4bf54c42e3e8dac70fa76091025d33699c9f7f68486edf41018bce95e2372899f7aa9b8b07552fecbbd5ca620b9a5208fe572f0eec6ad9262b50ebf053a5699ed20cfabdcc56e8bb7c43e48bdbf3df9e4680a0042972e3aab43dceb9d0ab6aa3eb4155dc3504120baaa3ccb256fe22f08e0d6bb022a5fd98dcf7d7e2fa29faed483abd61050de203b4fed419512f0e3f6a654fa5070f14f6331bdd8e66aab209a9fe77618facc5a28172adc4aae55967b6ab9370946cabc8b71858458f43be73fcafd6b37e9eb373072870078439c4354be83114887e8616ea4f2cce45d31bec6b33f2c3b34bdd920de3e99ef98d097ed76d39281f7608a29cc2a457322b7a210c02bc97460054a70034e8763a01a8a628168da3ffff03143db784696c022717e9810afb748b4cf617b96cd8669be6a5a983d5076e30f15b3142b85106ae1bcb5abce6126d7cd7323e7635e30a0d30231ea3581394e52a36b1d41647963338ca075f15f6d51400a86c8df72a970f75a955f2f010cbac679b9fd4a3bcf9842f959a80326353734bec0e69c8f63b63fefdfa5360fed0cf36efa5c75d2342f46db968e9d779d29a89cf0a12a376f7dce6634774bd5cb41fe0728ec251d253e3d06a6f846e47bddd5b039ab53bf917bbdb2b7dae81c48baa0dea0ae4ee47f5b11693f6207d7a7068df08b01192551a314c119ece9d625a1c1bb2672376446891b92426570b3a092131535a46df85a8278898816f69edfc747730a06a216697900caa1375fc0bdad05df3ae81a6425a9375020a8fd38054e08050b5a3aeb8efa37362de03957a9791cbaef603c53205b48e02bcd56fb94d0cfad6045a04f3479f697c196be53bfb6fad3ade126519a5ca9dd46a86c85d65b45502343b23da62bfa86c54f07df765fa9822706936ae574b8d2eecca8f1fce2c99773dfa591c9ba502d009f5112d54b98ab2338a5238172193b33a08ee01ebb6443d0cd9cc74216180d2a49c51f260c62a8a165a75a7d075d35f78da3490ecbb7538fa7298352312a823653b1087d16dadc2e8defe407604f181f845c6858a855f13248ea0f8ffcd3bf510162f2d0f20bf9c2515e8202ac1f970d0b9c79fa7b5eae86cb38b6ec8669b84485723e88cafe87f591172a6a05cc55892458a858a60e64842da50ec16757fe036fc5286cc31728e339f42a746f9214ad0172cb5f1a03367709a5bf85e7fd69a04796cb5b9a2b3fb0aecd03ef4f0459192a60ee43aff83eaf1637bd11bcde1875574823ce9b1ab6dbca1138975496552f029f8eb275755ca6429bb3d5d7217e7ead2dcfd9ba55fd7ed72dd6429ccc920736108a6127eef3c874ad2e96c4fec9a134fffc415ec5fb1cb04036483960ad5c495ac1c9ec862c95fb9176f2bff0b6ee0aa3d880338a884a1c368d399210fa377c639e056085d538945024035e4bd596ad0be982013546a26c70497d5e631826acd73e34cef924d5f76e73b04fa2c68f43e01857d02b8849ea7ada329a4921932ca1cae929a99f26347596858b6efbb780fc0fbed6968975ad5306a1e62871eaed45fada3e7e4dab1a9e3aa39ff1d48a1db5136d622f38ead4f200420e61857096e67682a31d253662c5368ce009a59078fb2e8b498f3326c98a5d66491d0ec1628f5d61d690161106a59022de9ac435686a38f7df2054ccd2a5bc0f1eb75d3bc598b2a09967b6332f16525039248e28b599d0415bfb9cd4eec6377b309245621dbad64796aef93eceede66242c035ec6418c121737ead33396676ebbb92df7396fc90cb59dafe57ffbdf04799bf2189988f38d9ae1ba91dddc7d1962c898f76259d1aa4f64516043f23c26f955b8d51fbbc0d4aa767aa8a8d51eb7b1d859a44229cfee40f23bb2f636ddd0b5d2c8f7544351ee1c405c82d16287cf6c4937e8013e954a804d7d8d25face2f3859589834de016ecd628409ef99ca0e6c3270ee01697bf9ebc00b604239bee96bbb6a60af2d57f31813b02c65d8d3f3c493582c9e92143d499be1360dbc84bc4ce47106e969afc1088ff8350053129ffc4f337c5b823b9530b05a76e62922b940c7857a4d280f45ccbc918650022f5a154924db899a3dd80399aaab30cabe7f4495907acba318961624d7ab34007854af897ff487bf2db46a6d014ffcefd3c4e1d2a017ca156c64b114759d575d5f09d042bc667aa12f060c891d42dbafc5ea694e62ac47611de697ae161c654757bfbd042a7c6accd85f9c0d40d961bf444ab6bc47394e80b1d326e877dd765f0a76f1c5763fbd8d24a8f67a93e6c7d3a2bcb42aa3a2b9c0d7b55ed4b7a3552992a31569dcc266a7c14e5e60b0e480d7d4ce09989a652d02eef8fba345aa07efdde88dfdd49d2acbdbe98eb2051474be402ca9b44fd13c5e8d02a7b2323b0b3d26a31ed40220db481752a9ec69a9dee4fd4b9f1997d557adb812b8233f08c6072d42a0581e8fe9b4913a769f10f7b3a46afd5aafa32c6a3c83f270f7cb1643d6a023101482a7a3c07935001886e8168e03a53d5bcdd57a2b4faaa770b9cf7958afc4b057a65d71554076fa2d78a78ebd82639b192447bf17a544c6c6576c2e3f2779f38ea58388f4c696518742030b43ad7bebc062f1bef7deef9686e0736fc92eff03e4b380a9188c6670d6cef6d856638312e4de0fc8b11bbe89b10b71c245ed05854c2205fb8a6b261aaf35fb9691508bf8ce3ffb7e267b6cc4d90858b99f8f85a7623cdc8efcf02feb37563ce1e5bf93ba56f428e07cbaf82aeb34d776fb8ead75e19c510fd1a90d4f243f5736d96c5ffc776c36fedcb7e4b42df65943a9f3697e1008983fd2a6a3d3c483814284f099fe0ab9cebd40a8aa4d26cc75d086972f91b3dc42be7f79cc8d522dd8d2c792ed07821b6b11528281c5f84d873b292efff471d72957b6c17f5b01e6a0f99c12f08b36d1f386819b0c328cb4c8aabd1797adc0f4aee1fdefa9de70718836edbe6c0f84087026a08bddbb2932760384975c056bb5eab0ebab495c98d5dd63438d10d2a4fb7e96167d3e7ae6732653385f34c5ce4a58b0f7b72748a7f3e72188305654e7f86967197103d430cc9a43ed510d8f234aaac75685177905b36a18fee94541ee9c8b5d3fd017176214cc9bec5cb1583095b2b60424b073bed1fcaa18b842d718835611e78608e107c89481c97c82c8d939d3dec02a1644641177311778fc021875359b2ecaa247196e8b701f6d7e96d2a8e499992a375c533a403310b241e3e18518a14b81217fbf8d3815f96ab1c109a3f6b428a42c6e2fa22c6b3974cd198c472fd710c979a39a09aca727dfb249aac6bba818bb11ac4384676c15bb724750ec5eeb64f060a0a987b45fd710cf81912bac31a0d68cf5421149050729d4b7d3402f16ff9652b915684f3513073e6778026dd4d68c776cf28e02e3d69cfb4dea160a70563c7ded9f142226490123e4f96b805e2dafc38a1633d7def0693dcdf21409a1a6461c9e5979223347fded2af56e46a3eaa641eee659ec22ff6f6e95363f5d63d1c2ae617f309442981e3d8ff91e7ee07d0da0b717025e26d155745007d4b8fa592ceff04dbdcb16c09d1f5f", @generic="328c5db6"]}, @typed={0x10, 0x3e, @str='\\ppp1,-$GPL\x00'}, @nested={0x294, 0x44, [@typed={0x14, 0x6b, @ipv6=@rand_addr="2486017eb39c3d261c4b3198c0ddbd03"}, @generic="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", @generic="c0b4cc20fab5acb28d6b9e1656af65e7121c26881f5c73b8ec64a146282eab3c34f65f86b03d40069753e7a38522f593b266a3e091cb276f3486e70120aa8dbed3a7af51228c5e4c5d89cafa4d3e3af414a1a9808f0288", @generic="7b6db59aa8a0845df8c0a0c37513872220b436a1d4999a33f87601adfe06933f854a0441e8b2f3c48b9fa9b81ec36cef6dffbe48949347dae9989514b564f083c17d811f53eaff469198e7aa6a77", @typed={0x14, 0xe, @ipv6=@ipv4={[], [], @broadcast}}, @generic="5b9036b6b4", @generic="a55243559c0fff6ec6eb1cc7ed30d57b426e3dea43925b72db8cefac3c774198c8a0824f3366844488cf6de832938e5f24b7c18a110a52db6c796ae3035627151afb788fee73a07b37f37a9b6cbae402578a4c1183fb980afc24bd1dc6ebe1aaed4866ae7baab08624f4af22ca68a96140267f4f30cc6f5505171aac4ecbb36297661e73fd3af6530c459329dadf42cf13c0525b4c8f49a9aa7df549a7b750b6bdef6563b2b908bbdd772c92", @typed={0xc, 0x77, @u64=0x6}, @typed={0x8, 0x6e, @uid=r2}]}, @nested={0xd4, 0x8e, [@typed={0xbc, 0x8, @binary="1c81b7bda89db5cfee24ebf10b38c3b94bf25e46ab8646d2b58772502e3ec0d5242aabbeb302c7863cb70683245c2fb5709a9f33f85283364a2cac73977f56497f9e8e660b6bf46720000e23e17958d0881dbb7c5a89bbea95a5425b5a581bf2e4bc0a426ce38e0420b9f149c99af2d9b12a7be935e316575000f4807a79b6ae559b8cf0869ce902fb39f19f281e561e5b7acd6ab38f9f3d5beee9b3b70b0f80a6bd97d28a09dac3ed93a620cd8f2db480fa64a2c6"}, @typed={0x14, 0xe, @ipv6=@loopback}]}, @typed={0xc, 0xa, @u64=0x80}, @typed={0x4, 0x53}]}, 0x2628}, {&(0x7f0000002f00)={0xe8, 0x16, 0x4, 0x70bd28, 0x25dfdbff, "", [@generic="1c650a5295cb0978af403faeebc9be2b384daa263ef73c9f58a7a6e1643da8ea1fe76ffc595ad7a82787d0125a70572222bf6001ce1a7c3c51886644e2a935253fdcb07046a33a9aab", @nested={0x24, 0x0, [@typed={0x8, 0x8d, @uid=r3}, @typed={0x18, 0xf, @str='ppp0#vmnet1[vmnet0\x00'}]}, @generic="f93551dd426dc7e1b050f5f81c9386d082e10fc48eebe52d", @typed={0x8, 0xd, @pid=r4}, @nested={0x10, 0x63, [@typed={0xc, 0x2f, @u64=0x1}]}, @nested={0x38, 0x7d, [@typed={0x4, 0xc}, @generic="879198339551b65764e2db6559803de1990f3caf09b88cf8cfc5e820bd93cd70eb3969ddb230f93ffc3ba8aa1f3113"]}]}, 0xe8}, {&(0x7f0000003040)={0x2b0, 0x1a, 0x400, 0x70bd2b, 0x25dfdbfc, "", [@generic="55b4cbe9d3bfe12e5b6f23f2beadb61d04d74d46e0c2e1e21ca5c47b7478a333251ff0f5582d9b1f2a95306a481830c4b1ef0f7c4295cec468ba17352f1559daa9d8a9bbeb81f116ef9c0e4e5f56b62314ec25a19bda94012556b731cb27786a7c6c9c09efe15e6106997496abf9923b77492fc59d0ec6a66e3a3f3b7a5a24898d2269cd4f243174633950f042aab48d6b", @typed={0x8, 0x24, @str='((!\x00'}, @nested={0xec, 0x76, [@typed={0xc, 0x8b, @u64=0x9}, @generic="3871f13f9f0b1ceeeae5ff3dd5b323181672f74c32189c5416d53e8e3112b1f40e", @typed={0x4, 0x14, @binary}, @typed={0x8, 0x32, @uid=r5}, @typed={0x10, 0xa, @str='securityem1\x00'}, @generic="761545c992ee5ff02c3c2ac1c09b2eed941541b88320a7a92a300070b7ecc491ddae85baeafa6e076ddbce155fee968066dbeaefe74b1c9b3c74a5ccf8bf204efdc8d6033281631308c2284a0c667181161724e207a2deed63fb460800ec570b0329dbc310d7a39b133e74ef2acf1ed2f4b25ccfa0d38729b3c872b10a0feacebd2a7dc19a99912853f85e88ece8f363f61a7656765c70", @typed={0x8, 0x87, @fd=r6}]}, @typed={0xc, 0x71, @u64=0x4f2d}, @nested={0x100, 0x3b, [@generic="16bb5263591e1d67847e9000fc5daf4fc4db8f91f95f8537188428182aeb7948df8bd67d0b67698cd3b245c8a51fcadf4411c576778d47f0cd83b6d8836fce66a9b072efb9acd51617d1d3251efe558abd25d94cf9be8f3186685672c871b2c21ce251d45032831b705a3d8b6281cdab4e8e6efed239f18e107471bc41eda40b1a8488bd48d9af1ff681e0527da2ec0640454163314c3dcb13279f1bef7229e764bfcf7fa00a837464fa3e2948ccb968043fba3ed4a55a73e74f", @typed={0x4, 0x31}, @generic="2544a86702277c851b823e43946dd64c3faa860a079bf7123705d5bd384231c5726bae58622413f0d603ffbe09e3ee28cb40bec68bece11d02", @typed={0x4, 0x5a}]}, @typed={0xc, 0x3c, @str='\'eth1([\x00'}]}, 0x2b0}, {&(0x7f0000003340)={0xac, 0x31, 0x300, 0x70bd27, 0x25dfdbfd, "", [@generic="8a08a4ee4974af6d71c59f5cd5b9e9aaca3beaea98154a87a35979ef22374cc143385c652488ab3ef0e7042d19ff2b25f34af224364d93fc784205f1c6927fe3acb56290d4503272a2a5e5b4557d5871b66c96251b10904cf76c816c25f2e86bb9a83ce1d37293d0918ef0cff058f7480642a9c3e333c72770721b89533394f1f34e2a829489b7687fa5ca93e77a490788220d7f", @typed={0x8, 0x3b, @pid=r7}]}, 0xac}, {&(0x7f0000003400)={0xb4, 0x41, 0x200, 0x70bd2c, 0x25dfdbff, "", [@typed={0xc, 0x37, @u64=0x7}, @generic="a7529d55ba2ff7bff632408e3e899202c408528252585ecfb288e6aaf75999c5f5f5ce425fd8a66ed2086f728c5c1c3c9da8761cb839a1e81b1d65cc81760d60e1f67b994fc82fc529c428f87bf3206e295a3ce64848650e6232ea724ea86e65456b5187519dd18bc9c7651094828bffd739139744002cd80e3eb87c7f0d824d66628ee500a3b7dc2314959f612a946f428a92", @nested={0x4, 0x4}]}, 0xb4}, {&(0x7f00000034c0)={0x28, 0x42, 0x300, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x4, 0x8e}, @typed={0x14, 0x77, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}, {&(0x7f0000003780)={0x1238, 0x16, 0x0, 0x70bd2c, 0x25dfdbfc, "", [@typed={0x4c, 0x54, @binary="28161909a79a5b93659486e21028bf34d268e3b2442dd750b99f7c36b413423576d5fb15d5d1ad4a13591e4a6a95d487451fec291f0c31a44e306773c87d71d2c779557b85e7"}, @generic="02089a57a405013665c52950a2d3b8ef0ff77d960e0d597ac5a2895332a735571de8a6265613812a4ac12159883d00c028391ad2218bcdfd435a239ee43337d6cd45d5db9f782152cf5091a20d560b50d85aaf1028a1c2716a584bd45eab2d742acb6df93ea7eac0dbb1777566a730", @nested={0x164, 0x68, [@typed={0x8, 0x7b, @uid=r8}, @typed={0x14, 0x62, @ipv6=@mcast1}, @generic="a33255a647ad699c36258fac4f4525b1e68731859e0af91e91b4d62cd383101efd4c7312cf7b4aadfa9be88615f91e3e4a90cd89c7b9e22dbacc4fe4d024d424174d36879d0376ce5da4286ff600675c20692fd4a30a581bb2f082c52e6aa3632a5467b44675ae088780a66f76052fc8039e5aea5a0170cdbcf8f4710da93eef3d8d404ee8b84e358b173afab7aa764675d8defa2b22a35be64e7d0b431f00e088a52afb408aa076603b8daa538f07e7bdf6", @typed={0x8, 0x83, @ipv4=@empty}, @generic="753aeccabaec5d79bafdb9e713bc72307c5b70925d0e8320dcbbd2f9b7c7dd5e898dedfcc7a5ffcb2d71a0c52cab0485b1bb9611385045038f8fd0e9aef683737fce4c0c711ee225354bda3ed6b002350014030f2172628c0b0a35aab1a2cb5a61996a95c5a07e6d8534f7a5381933ee34b32be50092c10c526000f3f28533b3103797309c34517c6c"]}, @generic="6ff17b100e3d28befd51cee2b5cd12992214165efeb5384976ca5306b0350021a385407e64219a8fcb5f7f55a2e3140b04fce840f0c2d32c523eb4b5fa9448ad108ae0f3027fc3b623e4cd240738624d54d5f4e0db4a602319184bc36717f2cb3caa92c95dfa78f1749505255ddd97fdad5c295e8bc2f8f443b3fd9600c53cf3e09c1e37978394678f5d76b1ac61321105fc6399868fdd9bdd1f2fdda81abc9321f1e2b080155aea4021c89daf61a876937281e02429dde8e189e1e710e59b21c108a5939c2091bd76c969b784e0784f68a11efb73a8ffc3ead3e9d7f3b33babe93fa08f80f9507a1105ce17d438c95fa990f2e1468c6ffc1c80d5e97aad29f6d4af28dfeb870854e82df95acd1964c2540aa41e4263e36f6b66ee0508447a62de47c6fde5303bd7536fe8e4bb8662d4a5b3a43ecad8346a0b150d79f18b6a2905223b32d0bd4c9ae6356b6e82497818d1e5aff841390660ba9ab22ac82fa8584dbc3115490b1f042e7234fdb4eadd2136df0ebd1dc4aebe67239d8da6044c0d03dc242cfde6ad52f6b380ba8ff4364a9d1f8c5bc5d8d17c1fde9301c9e65ceabb7b42d871658909bd817b162c2626ffb322d16a56aa109a75e19829d93d0bfb059a593ed7e207cbbc27e7d36b14b740c161921bce89eb4caad44324b53ec88c0bdbd19b57e43b5dd26ef3c693c6acf372c79e2a1c6ef6182011d0fc8875fdf60bae16a49cdc9da74c618365784b96d7ec5722a7ae37947a73cb532fa6a8573a72563fa432467205e2cdf3fa103dee2c04a9a228974fc50177d1dc6e19b32c9aedd9a2d8f1f6bd34fccc2160daf17f5caf38d64b6968ede9cf38b2d7b2b60ee70a4cf5bd356af804b2897d68f8dbc9cb6d641a30cb825495ce8179e433b40c80a6775e72dfb7547a1ee6794071ba10510aeb1c14eed0130090aa687a4ed7a247d47e138edb888ff560ec029a3a2b34b0c0b05b1e22d289a3220944e22e1ef262a945eb2f65ce9c85307a06f606703ab8582ef9e501cfd64a7ebabee898a80898dddf99299e62f07ba92085ef85e74fcd886e74582a3580187c024c9ce14f59cee454771e3f77593739e9af805d31ec91688c8f3bce7ac57e302e49944b146c57df92ebbfc83ff40b43dc82d70f1ef7c0dc9152b34d320a5dd8cca5e7ad4be8d86ba5382221e8cad70646e9b1a6e212d62be0bae86461f2dab5d1b69c0d03e8530bd718c1d272bdd616c9927ff1177962f1ae6a382019da636ba08e85ad723ea8123361ff610659a704b666346b9689b1344bb5294b14215f8f2c5f6acbdbe41673451dedd23b6bfa36fc18ebc4c7f0742c847655c8e2e84a8f1317cbcae384826cf1c5a52941d6b7165607f9cc0b402842b80308f4148c03a8ce07adfb537e3d957c5bf6ccaf22ccfefe744dddcff2a5b7693b5e0270de0f593d224fd5e1d20b49cb47e6bdb43e3e99f71878c3074e0cf0b6bfcec94f11ce18d21289bd682cf12bc1cb661dd54582a51801b4a902542eb971adb948b38b9edf87013715d7ab029bae2ca998888fdccccc9239ae5a3f5ba00ad055911800eae9d7437126a4d81e84428456c501093f3b39362fe7a4dad4aa2e7ec6f866ec30a16af838284851ebb931539d7e931ebc315f9a9fc39c9e4351b45bf94f2707d179e1257fe79731768ad623a71f08481e2cb18c395b4a37934f49908755c0243a32e8d3cba1d2affbc02141abbfc0e69ad30d7c0fa793aef1e6872291287ed7a5398f3b3badd88ce7a0a02ae3c0488eabe9210e79680ba48828b29049c7dfafb3766779c3257f16c723cbf816e691663ffc5cd75c7a0a9292bba5ea6ab846586048ddda4697b56af852dce6249c65d442491fc819f9f821852025a7cd36f320c33c64009a5db19a310d529b4c1b392f35be6576861f65a53471100657de18a00bde18687488072924af17290fccea4f3ad49958a0a2133541ab137d52d18b7f396d85ce814353fbba6795ed4705ed72300d244107571f082e7d0be5a0cf88f1f688d74648ebac750ae88ad77de11aff0e186292cb62fa6d5c5644bf870811e2fef0e24d993d439e436a670a63f912963b03c568c4e21b35a1aa2b5962c49924513b62932982e53bc125488784978126db5c9fc3a6d13789c03255c976f7e2a81ed7488bda544c2118ce469f638432dae6af8f523d8a16f3424b9920c1f8cedbf6531427a240ff8cff84814a14ab8ffe6eb74fd6a752d7deacb056e4da3929687d1051cdc36c7835b6017b1b737c58bf1ec2b0b1dd694f56529b48b19dbdfa498872e1b44c68f270ee00b8f6c40c1d563a03f7912c7cd71419da6fe5f25fdeb8680ce6221509cf056002777a9a27160d25526f3977849781b52c154e36fb908b51b70e5b57df0322a4dca9b57d295e65bdc21b10f4a32a071514b9e06895e105e8e65bd4b96f3b19f29edb9b848911511e382711353e17184871e92d03cae64238a5fcfd900d3407eed3fdc9d8f5e25656b1d60156c520288d768141d7ab9f529fbc811fab3e02ad139655fce87f4000d4d06382e7258bdf71625fcef423a96c0dce835bf40f3a11b4648d44e081df69af03cf23ce35eff17286a6127293823437fdf28b847fdebe7e4cdb39a523c8d4529e1fca35cf11015e6992c5e3522c0c36863b74d65d80177a1d945f972f233a46e54a3d2f56fb842b93eb22af0b647e9e17dd3e28e2e6cf66f5c194825834200188d5ff1c0e2b542585aa44b08e48da498a520a96281ec98f08c7616a6f2ac64ab72d947bbc853793b4e2019396c96a44d62b8f99fccc4eb72d3dc8ac52e51bd9813efb77cca47cc4051c2d6c10094bbfa306a954883ad17fde5f3033f03c16505ce70455b0166284fab89e9961e6d8de2df71eec033a2b11184dfe23f1aaae6a024f4c81a6ab5f045855dc05fa623ef1b71dfdbf2bc3ce4ad86dc2c807bae470d237483d0f44dbbce0beef087aa531a41196f8a6b371b016bb0e2aaaf4b95e91d7c1995dbb099ef1d416513087cce6ac9b2af91e82f129cfa508f54a152d12bcc6d878ffed51c263133e5558660a1a8d5a0cec7e2ee2fa08addeffce3f09d335eeee849000c09280bcda9bcdabc1b1315356996c9444e155a1a11dc0094d679cfa3b3073e67f7065d8b9651f65b9b3382b6b7afd6d2c74374caba70db0ed036d3c67570b7010e628261330288a0b4e28bfa3540546d1057f3b7fb655821d2e9d2edd7d2dec0aeffd942d952bc47c8ece5eb83ee358d2ba3e2eaf36c7f8c7a49bf93eecc2170b503fcaf8b69404f79394c6d708bcbcbf9dfedff3da65164b807718c9533bd7430c403405708dae4af2896cd0c856721633aebaaa96e5ebd0fbe27a13edbec6dcfe2798fde5d64a47591b12f66dd75f691d3446d0fed07088a1b60f1d111eaa62628c2f73fd18f3823ae14021cc8839ff0627f0581fd737cfb91e5c7edb226e1f5581afbf5192517441d1287a73046fbf3fdf5cf57fbf95801350501d8b687d95a24be867856fed1584edd86e128ef3fef98ef9375194439fff9882699bd0f8f15808236e5ab2722e8c1b4b7a9039f14077dce9bb95885cab0dd7febfc062309bf78b298030449d5d66b9f03974a54bb699f8c5f69705568ac745fcf333fa698f666f212f43cc91620b7ac789d7e88f65c27d7d93a5097a20d014d2c14ed5613984a31a0c5fea6e610b247dc11edc75a8c3ea9f653960c9c59a4e707025786cd59a2e675843f8cbc4ae29da9900f0f9f1ee17759720d780f8b25c6a5f781382bf6d758a23d5f932af7958d40ddd3ce179ad3bf9f13c04d2d7f30c19885fdccd15bbe6e5e061997c6874cbb455248f931e36118fda6a464caf051893c1d72f0e0db013f5ad26068c7c2cae7a493b0e5aa7654853ddb19a9c00d24ac5506dffdfb6610dcd4f8fb79f5d2c59a56fe8c9b3f3fa05e7223d99bc45647a0acf0b91fa84c133b78589414a0edc602d972b54a612f1992d4641399204f960f421ac5b25bc1b72b12b16fcbf09c2f2b176f0a127ddc7b21ac93df3ba95d047e21f9448f9758ee990adbb2f15c94990b826c694a766b8c023d162e2079dff3a02fbee0ae665a657173591fddc5793f806af547e4a2714c9dd9d203bbf705fa868c65c17fb4931b90f2b2b24ce138c7833731b35d320be4d696589ec45b32692222849b480eeb9e1416a7eea4fc56160dce1ded2f201c476907cc54c69784befdfa214eb6c9146ce0e75b0b48da5cb170f009837992b42f7e4f37e968f2d333ccc8c68e671bd3394bb50f6a51dd7e1126c92d9a7ffe5de5265ec26c687597b89d8809156e90975aac539b58f0efe178cf47ed47a503a631d2936451fc15d5e2c7eb900a9ea495dd900b2b62e4f17f2d1cf07afa0591e4a15a903c0599cbea1455c4c46e9937fe6ea21757cb02246b11bc273598688705278a5263518da22a0474f7888f7309ff2e2405316003f6e56f07376a13ac0805d6c4eae3ae787a39c8feb3aa9be0db19736f9206ab19ecaeb27313fafeb7cbec6ae4cb434a6459e285e3981497c6e57c4d95ac950f84e50d8a3544004bf5d43d859477aca48b0e913d2d102594ba78d2f2bcfd475911018a22589df930ddd5aa8bb652e4c31ac3f01357788141bf606a1cd1abaedb14508860849a9c84a601ef82d86f855c97d10e3fa9acc6ea7bcbaccc432c785a32ffc2430dffd0f2475201a05842f7f013f1316aa4dccaee287014e58cb4f3dd19bed0cd976bac75a504f91b0b7b24d532e2162b8223c078f57bb2b176439ba5fb7c91847b54515fadd8e84cd0d5f0f38f686c1bbebcd04540b49a409fe2e677f26b783cede7bcd2f0921391f28818ca90539cf4b1120d1c6f6dcf20f9764abf9f04a964e05dcdcd09cd563b2ff361424476e12cd46c687a9610aa8575b08e44a708e2fe1850016f1e32717e7abbcac58954d8ada9e424aea24039bef8ed877a79f44e21a812680a472bb560dc8ef0f340170c00aece5f78e560f14b8e691531a4438b735a892bde83cb5540b32a3a632656b9ba830925e49381900399705e2a58edf70c0dc799e61a880305c40f814ef1c7aeb03d3f3e87cb6bbef297a34e40ca70a2b26aae503470dcaf8324c49e5ccffcf2ad865dfa0391784e44d01ad586a2a1033ce4afce30675360e91038b0042b93353f0c7469bff0352384906c3ee1d360d13b63abf47558e6e66cd40434d29dd85e40187de24b77866fb3ad2deb0dbc0f70b9e53c1c12be441f19c1257be48b89290f39a4cc66f4f82c085277be6366af889d4409f4c1019b3834d7d9120bf6c11d57f5a0df84690d509583bc1bcebc6ec3efd513f7d0b6b826fe99ec9bffe4b3cd3ce552be48e560af14f2e33a1adffec97f24a9bd1734d1dbd616d1b3899b96d97f1b6f20e2b3f008eaed4829bf4833d0fefe83451bb8c107347b3624d938ea2b142c236c545eed8acff31b5892507bea074e36600c5d65f765557c666904ba93fa2aebf00fa4eaf9712ec3afb2bd586d773822e29005710b26a455777d57b0d0bce9ab9a3a0c141fa4159892e2f3edd6432edd76b10201e57bc7985c52d314db76082e8a1cf56dcc7321d7e15e917e95e5bbb4f3975070917b2ed1f32dffd22af2eda5a5019e7105956d5cdb77611d0d94538b047a3fed44fcee437b4ddbd2bb474a244f3575abdbd817be4114776f0dfb4fa283d0168caf531d9c76ac12595384f1e220573e75d91074e4ac3b049e28ad9aa31fc8064b9bcf1864257e81c11badeb8d245327ef57419695165a927e84f1cf2cce3f25257e839", @typed={0x8, 0x26, @uid=r9}]}, 0x1238}], 0x8, &(0x7f0000005280)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x28, 0x1, 0x1, [r13, r14, r15, r16, r17]}, @rights={0x20, 0x1, 0x1, [r18, r19, r20]}, @rights={0x20, 0x1, 0x1, [r21, r22, r23]}, @cred={0x20, 0x1, 0x2, r24, r25, r26}, @rights={0x38, 0x1, 0x1, [r27, r28, r29, r30, r31, r32, r33, r34, r35]}], 0xe0}, 0x20000000) r36 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r36, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:46:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400fd00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2893.905640][ T26] audit: type=1400 audit(2000000783.729:110614): avc: denied { map } for pid=13844 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2894.075711][ T26] audit: type=1400 audit(2000000783.749:110618): avc: denied { map } for pid=13843 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2894.151233][T13967] audit: audit_backlog=65 > audit_backlog_limit=64 03:46:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='+yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ce00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x02\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x03\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002300050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="9280094a9ec59d269c2a8042649f9857", 0x10) 03:46:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ec00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='-yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003500050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x04\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f100050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='.yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:27 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 03:46:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x05\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2897.611275][ T26] kauditd_printk_skb: 234 callbacks suppressed [ 2897.611290][ T26] audit: type=1400 audit(2000000788.659:110848): avc: denied { map } for pid=14437 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='0yzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2897.785754][ T26] audit: type=1400 audit(2000000788.669:110849): avc: denied { map } for pid=14437 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') exit(0x0) fremovexattr(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='o']) 03:46:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400fd00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2897.925024][ T26] audit: type=1400 audit(2000000788.689:110850): avc: denied { map } for pid=14437 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x06\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2898.093838][ T26] audit: type=1400 audit(2000000788.709:110851): avc: denied { map } for pid=14437 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2898.293836][ T26] audit: type=1400 audit(2000000788.719:110852): avc: denied { map } for pid=14434 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='Xyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2898.534368][ T26] audit: type=1400 audit(2000000788.719:110853): avc: denied { map } for pid=14434 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400a900050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2898.656218][ T26] audit: type=1400 audit(2000000788.759:110854): avc: denied { map } for pid=14437 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64000601050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2898.815444][ T26] audit: type=1400 audit(2000000788.759:110855): avc: denied { map } for pid=14437 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\a\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2898.886122][T14557] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2898.905756][T14557] audit: audit_lost=1397 audit_rate_limit=0 audit_backlog_limit=64 03:46:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='cyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ce00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003701050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:30 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', 0x0) getgid() getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0xc9) msgsnd(0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) stat(0x0, &(0x7f0000000100)) 03:46:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\b\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='dyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400ec00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\t\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64007001050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='iyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f100050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x6, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) 03:46:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\n\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64008001050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='lyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f800050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2902.618276][ T26] kauditd_printk_skb: 249 callbacks suppressed [ 2902.618291][ T26] audit: type=1400 audit(2000000793.649:111101): avc: denied { prog_load } for pid=14762 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:46:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\v\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='oyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400e301050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2902.785983][ T26] audit: type=1400 audit(2000000793.729:111102): avc: denied { prog_load } for pid=14762 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:46:33 executing program 2: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) openat$mixer(0xffffffffffffff9c, 0x0, 0x200, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x84000, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) [ 2902.916592][ T26] audit: type=1400 audit(2000000793.869:111103): avc: denied { map } for pid=14807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.039124][ T26] audit: type=1400 audit(2000000793.869:111104): avc: denied { map } for pid=14807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400fd00050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2903.160484][ T26] audit: type=1400 audit(2000000793.899:111105): avc: denied { map } for pid=14807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.281927][ T26] audit: type=1400 audit(2000000793.919:111106): avc: denied { map } for pid=14807 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='pyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\f\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002202050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2903.481891][ T26] audit: type=1400 audit(2000000793.919:111107): avc: denied { map } for pid=14807 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.676539][ T26] audit: type=1400 audit(2000000793.939:111108): avc: denied { map } for pid=14807 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2903.834884][ T26] audit: type=1400 audit(2000000794.019:111109): avc: denied { map } for pid=14807 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.993065][ T26] audit: type=1400 audit(2000000794.039:111110): avc: denied { map } for pid=14807 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64000601050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$getflags(r0, 0x1) 03:46:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\r\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='uyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009802050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64003701050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x0e\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='xyzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64005803050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='s\"zkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64007001050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x0f\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64005a03050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:46:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64008001050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='sy\"kaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x10\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64005f03050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:38 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:46:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x11\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2907.677217][ T26] kauditd_printk_skb: 209 callbacks suppressed [ 2907.677232][ T26] audit: type=1400 audit(2000000798.729:111320): avc: denied { map } for pid=15304 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400e301050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2907.827030][ T26] audit: type=1400 audit(2000000798.739:111321): avc: denied { map } for pid=15304 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzk%ller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2907.966514][ T26] audit: type=1400 audit(2000000798.759:111322): avc: denied { map } for pid=15304 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64006603050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2908.156176][ T26] audit: type=1400 audit(2000000798.779:111323): avc: denied { prog_load } for pid=15305 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:46:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x12\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2908.315664][ T26] audit: type=1400 audit(2000000798.799:111324): avc: denied { map } for pid=15304 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2908.526950][ T26] audit: type=1400 audit(2000000798.829:111325): avc: denied { map } for pid=15304 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) r1 = socket$netlink(0x10, 0x3, 0x100008000000004) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 03:46:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64002202050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2908.722108][ T26] audit: type=1400 audit(2000000798.829:111327): avc: denied { map } for pid=15304 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka#ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2908.929649][ T26] audit: type=1400 audit(2000000798.829:111326): avc: denied { prog_load } for pid=15305 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2908.983164][T15326] audit: audit_backlog=65 > audit_backlog_limit=64 03:46:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64006903050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2909.024024][T15328] audit: audit_backlog=65 > audit_backlog_limit=64 03:46:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x13\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009802050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka%ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:40 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) socket$netlink(0x10, 0x3, 0x100008000000004) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60) 03:46:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64006a03050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x14\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64005803050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka*ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f403050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) socket$netlink(0x10, 0x3, 0x100008000000004) 03:46:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x15\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64005a03050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka+ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400c00e050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x16\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64005f03050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka-ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) [ 2912.710434][ T26] kauditd_printk_skb: 257 callbacks suppressed [ 2912.710449][ T26] audit: type=1400 audit(2000000803.759:111575): avc: denied { map } for pid=15497 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009402000028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x17\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64006603050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2912.864048][ T26] audit: type=1400 audit(2000000803.769:111576): avc: denied { prog_load } for pid=15495 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2913.015689][ T26] audit: type=1400 audit(2000000803.799:111578): avc: denied { map } for pid=15497 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka.ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2913.205661][ T26] audit: type=1400 audit(2000000803.789:111577): avc: denied { prog_load } for pid=15495 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2913.440198][ T26] audit: type=1400 audit(2000000803.829:111579): avc: denied { map } for pid=15497 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400030028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2913.648443][ T26] audit: type=1400 audit(2000000803.829:111580): avc: denied { map } for pid=15497 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x18\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2913.832617][ T26] audit: type=1400 audit(2000000803.879:111581): avc: denied { map } for pid=15497 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64006903050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2914.075946][ T26] audit: type=1400 audit(2000000803.909:111582): avc: denied { map } for pid=15497 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzka0ler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2914.335638][ T26] audit: type=1400 audit(2000000803.959:111583): avc: denied { map } for pid=15497 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2914.420691][T15525] audit: audit_backlog=65 > audit_backlog_limit=64 03:46:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009402050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64006a03050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x19\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaLler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009403050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1a\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400f403050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkauler\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1b\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009404050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009402000028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0xa56, 0x4) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal#er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1c\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009405050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2917.786532][ T26] kauditd_printk_skb: 247 callbacks suppressed [ 2917.786547][ T26] audit: type=1400 audit(2000000808.839:111814): avc: denied { map } for pid=15682 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400030028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal%er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2917.924345][ T26] audit: type=1400 audit(2000000808.869:111815): avc: denied { prog_load } for pid=15679 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:46:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) [ 2918.093278][ T26] audit: type=1400 audit(2000000808.879:111816): avc: denied { map } for pid=15682 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2918.305696][ T26] audit: type=1400 audit(2000000808.889:111817): avc: denied { map } for pid=15686 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2918.448478][ T26] audit: type=1400 audit(2000000808.889:111818): avc: denied { map } for pid=15682 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1d\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2918.665680][ T26] audit: type=1400 audit(2000000808.889:111819): avc: denied { map } for pid=15686 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009408050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:49 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) [ 2918.805731][ T26] audit: type=1400 audit(2000000808.899:111820): avc: denied { map } for pid=15682 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009402050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal*er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2919.005632][ T26] audit: type=1400 audit(2000000808.909:111821): avc: denied { prog_load } for pid=15679 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2919.195635][ T26] audit: type=1400 audit(2000000808.919:111822): avc: denied { map } for pid=15686 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2919.273669][T15707] audit: audit_backlog=65 > audit_backlog_limit=64 03:46:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1e\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:50 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009410050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal+er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009404050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17%\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:51 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094e0050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009405050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal-er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17/\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:52 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400170028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal.er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009408050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\xab\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094001f0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkal0er\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2922.806350][ T26] kauditd_printk_skb: 264 callbacks suppressed [ 2922.806365][ T26] audit: type=1400 audit(2000000813.859:112073): avc: denied { map } for pid=15847 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940a050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\xbc\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:54 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400200028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2923.045671][ T26] audit: type=1400 audit(2000000813.859:112074): avc: denied { map } for pid=15847 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2923.325642][ T26] audit: type=1400 audit(2000000813.899:112076): avc: denied { map } for pid=15806 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2923.502961][ T26] audit: type=1400 audit(2000000813.899:112077): avc: denied { map } for pid=15843 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2923.654993][ T26] audit: type=1400 audit(2000000813.899:112078): avc: denied { map } for pid=15823 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalLer\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2923.912673][ T26] audit: type=1400 audit(2000000813.859:112075): avc: denied { map } for pid=15847 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094005d0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940e050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b\"\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2924.039980][T15909] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2924.051988][T15890] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2924.083823][T15917] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2924.105674][T15890] audit: audit_lost=1414 audit_rate_limit=0 audit_backlog_limit=64 03:46:55 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaluer\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094017f0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009410050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b%\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400020028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009460050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkall\"r\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96%\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:57 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400030028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:46:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkall%r\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094e0050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:46:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x02V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:46:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\"\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400040028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2927.822459][ T26] kauditd_printk_skb: 306 callbacks suppressed [ 2927.822474][ T26] audit: type=1400 audit(2000000818.869:112371): avc: denied { map } for pid=16156 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400170028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:46:59 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) [ 2927.989755][ T26] audit: type=1400 audit(2000000818.869:112372): avc: denied { map } for pid=16159 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x03V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2928.163565][ T26] audit: type=1400 audit(2000000818.919:112373): avc: denied { map } for pid=16156 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2928.378584][ T26] audit: type=1400 audit(2000000818.919:112374): avc: denied { map } for pid=16159 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2928.518837][ T26] audit: type=1400 audit(2000000818.919:112375): avc: denied { map } for pid=16156 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400170028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2928.702412][ T26] audit: type=1400 audit(2000000818.949:112376): avc: denied { map } for pid=16159 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:46:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle%\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:46:59 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) [ 2928.875635][ T26] audit: type=1400 audit(2000000818.959:112377): avc: denied { map } for pid=16159 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094001f0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x04V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2929.086868][ T26] audit: type=1400 audit(2000000818.969:112378): avc: denied { map } for pid=16156 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2929.315637][ T26] audit: type=1400 audit(2000000818.979:112379): avc: denied { map } for pid=16156 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2929.411782][T16182] audit: audit_backlog=65 > audit_backlog_limit=64 03:47:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\x7f\x01\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400200028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x05V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094005d0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\x80\x01\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x06V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094005d0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094007f0128845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkalle\x80\x04\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\aV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094017f0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400800128845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x02\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2932.825659][ T26] kauditd_printk_skb: 260 callbacks suppressed [ 2932.825673][ T26] audit: type=1400 audit(2000000823.869:112614): avc: denied { map } for pid=16331 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\tV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:04 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) [ 2933.065649][ T26] audit: type=1400 audit(2000000823.869:112615): avc: denied { map } for pid=16331 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400020028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2933.225709][ T26] audit: type=1400 audit(2000000824.239:112616): avc: denied { map } for pid=16341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2933.347031][ T26] audit: type=1400 audit(2000000824.239:112617): avc: denied { map } for pid=16341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2933.505680][ T26] audit: type=1400 audit(2000000824.309:112618): avc: denied { map } for pid=16341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller*\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2933.680909][ T26] audit: type=1400 audit(2000000824.309:112619): avc: denied { map } for pid=16341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050200845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\nV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2933.853805][ T26] audit: type=1400 audit(2000000824.369:112620): avc: denied { map } for pid=16341 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140), 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) [ 2934.014486][ T26] audit: type=1400 audit(2000000824.369:112621): avc: denied { map } for pid=16341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400030028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2934.205654][ T26] audit: type=1400 audit(2000000824.419:112622): avc: denied { map } for pid=16341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2934.415632][ T26] audit: type=1400 audit(2000000824.469:112623): avc: denied { prog_load } for pid=16349 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050228845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x92\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\vV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140), 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400040028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050328845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x93\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\fV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:06 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140), 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400170028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050428845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xa6\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\rV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xaa\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050528845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094005d0028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x0eV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0x3cd) 03:47:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094007f0128845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2937.874015][ T26] kauditd_printk_skb: 216 callbacks suppressed [ 2937.874037][ T26] audit: type=1400 audit(2000000828.919:112840): avc: denied { map } for pid=16517 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2938.067761][ T26] audit: type=1400 audit(2000000828.959:112841): avc: denied { map } for pid=16521 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xbb\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2938.288563][ T26] audit: type=1400 audit(2000000828.959:112842): avc: denied { map } for pid=16521 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050828845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x10V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2938.432725][ T26] audit: type=1400 audit(2000000828.969:112843): avc: denied { map } for pid=16517 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2938.617156][ T26] audit: type=1400 audit(2000000828.969:112844): avc: denied { map } for pid=16517 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2938.754561][ T26] audit: type=1400 audit(2000000828.999:112845): avc: denied { map } for pid=16521 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400800128845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, &(0x7f0000000200)=0x3cd) [ 2938.995688][ T26] audit: type=1400 audit(2000000828.999:112846): avc: denied { map } for pid=16521 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2939.197015][ T26] audit: type=1400 audit(2000000829.019:112847): avc: denied { map } for pid=16517 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xc1\x00/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400051028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2939.326003][T16543] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2939.337540][T16546] audit: audit_backlog=65 > audit_backlog_limit=64 03:47:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x11V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, &(0x7f0000000200)=0x3cd) 03:47:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller[\x01/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x12V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050200845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940005e028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, &(0x7f0000000200)=0x3cd) 03:47:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xa1\x01/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\x14V\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050e2c845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050228845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:12 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 03:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95]\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x1c\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050428845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:13 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 03:47:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940005002884a700000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2942.910767][ T26] kauditd_printk_skb: 253 callbacks suppressed [ 2942.910782][ T26] audit: type=1400 audit(2000000833.959:113094): avc: denied { prog_load } for pid=16799 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x80\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2943.096809][ T26] audit: type=1400 audit(2000000834.059:113095): avc: denied { prog_load } for pid=16799 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xaf\"qP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2943.256043][ T26] audit: type=1400 audit(2000000834.089:113096): avc: denied { prog_load } for pid=16800 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2943.409052][ T26] audit: type=1400 audit(2000000834.139:113097): avc: denied { prog_load } for pid=16800 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:14 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 03:47:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050528845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2943.617915][ T26] audit: type=1400 audit(2000000834.199:113098): avc: denied { map } for pid=16803 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028848102000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2943.775785][ T26] audit: type=1400 audit(2000000834.199:113099): avc: denied { map } for pid=16803 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2943.955985][ T26] audit: type=1400 audit(2000000834.199:113100): avc: denied { map } for pid=16803 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2944.155983][ T26] audit: type=1400 audit(2000000834.239:113101): avc: denied { map } for pid=16803 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xdf\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xaf%qP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2944.344257][T16821] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2944.363429][ T26] audit: type=1400 audit(2000000834.289:113102): avc: denied { map } for pid=16803 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00\x00\x00\x05\x00\x00\x10\x00', 0x802}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x334) ioctl$sock_ifreq(r0, 0x8914, 0x0) dup2(r0, r1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) 03:47:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050828845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940005002884c603000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\x12\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xe5\x02/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050a28845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028841b04000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) setsockopt$inet_int(r1, 0x0, 0x32, &(0x7f0000000000)=0x1000000, 0x4) 03:47:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\"\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\x14\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050e28845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller-\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a02000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2I%\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400051028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:18 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2947.916650][ T26] kauditd_printk_skb: 230 callbacks suppressed [ 2947.916664][ T26] audit: type=1400 audit(2000000838.969:113329): avc: denied { map } for pid=17187 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller;\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2948.105417][ T26] audit: type=1400 audit(2000000838.969:113330): avc: denied { map } for pid=17187 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400056028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x14u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2948.369851][ T26] audit: type=1400 audit(2000000838.969:113331): avc: denied { map } for pid=17187 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2948.444446][T17231] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëänà [ 2948.528156][ T26] audit: type=1400 audit(2000000838.969:113332): avc: denied { map } for pid=17178 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2948.736873][ T26] audit: type=1400 audit(2000000838.969:113333): avc: denied { map } for pid=17178 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a03000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2948.922038][ T26] audit: type=1400 audit(2000000838.959:113327): avc: denied { prog_load } for pid=17180 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2949.077699][ T26] audit: type=1400 audit(2000000838.999:113334): avc: denied { map } for pid=17181 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940005e028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerF\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:20 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2949.134749][T17365] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2949.142791][T17409] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2949.169694][T17365] audit: audit_lost=1434 audit_rate_limit=0 audit_backlog_limit=64 03:47:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06\"\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a04000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940005002884a700000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06#\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xc5\x03/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a05000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2950.355620][T17431] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëänà 03:47:21 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028848102000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06%\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x1a\x04/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a08000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2951.435458][T17447] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëänà 03:47:22 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f6400940005002884c603000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06*\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\xb8\x04/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a17000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028841b04000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2952.731085][T17468] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëänà 03:47:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a00030000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06+\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:24 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x02\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2952.953635][ T26] kauditd_printk_skb: 260 callbacks suppressed [ 2952.953651][ T26] audit: type=1400 audit(2000000843.999:113592): avc: denied { map } for pid=17471 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.155645][ T26] audit: type=1400 audit(2000000843.999:113593): avc: denied { map } for pid=17471 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.312300][ T26] audit: type=1400 audit(2000000844.019:113594): avc: denied { map } for pid=17471 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.498427][ T26] audit: type=1400 audit(2000000844.079:113595): avc: denied { map } for pid=17471 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a02000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2953.738271][ T26] audit: type=1400 audit(2000000844.139:113596): avc: denied { map } for pid=17475 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06-\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:24 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a017f0000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2953.948383][ T26] audit: type=1400 audit(2000000844.139:113597): avc: denied { map } for pid=17475 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x03\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2954.128081][ T26] audit: type=1400 audit(2000000844.209:113598): avc: denied { map } for pid=17475 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2954.320756][T17493] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2954.342684][T17492] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2954.365299][T17493] audit: audit_lost=1436 audit_rate_limit=0 audit_backlog_limit=64 03:47:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a04000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06.\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:25 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a1fffffff000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x04\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a08000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x060\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:26 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000020000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x05\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0f000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06X\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01020000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:28 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a17000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06c\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\a\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2957.960186][ T26] kauditd_printk_skb: 248 callbacks suppressed [ 2957.960200][ T26] audit: type=1400 audit(2000000849.009:113844): avc: denied { map } for pid=17579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2958.141468][ T26] audit: type=1400 audit(2000000849.009:113845): avc: denied { map } for pid=17579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01030000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2958.303662][ T26] audit: type=1400 audit(2000000849.009:113846): avc: denied { map } for pid=17579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a00030000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06d\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2958.414034][ T26] audit: type=1400 audit(2000000849.059:113847): avc: denied { map } for pid=17579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2958.563112][ T26] audit: type=1400 audit(2000000849.099:113848): avc: denied { map } for pid=17579 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:29 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\n\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2958.692845][ T26] audit: type=1400 audit(2000000849.099:113849): avc: denied { map } for pid=17579 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a017f0000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2958.860876][ T26] audit: type=1400 audit(2000000849.139:113850): avc: denied { map } for pid=17579 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06i\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01040000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2959.074687][ T26] audit: type=1400 audit(2000000849.139:113851): avc: denied { map } for pid=17579 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2959.313129][ T26] audit: type=1400 audit(2000000849.169:113852): avc: denied { map } for pid=17579 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2959.509348][ T26] audit: type=1400 audit(2000000849.199:113853): avc: denied { map } for pid=17579 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerH\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a1fffffff000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01050000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06l\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:31 executing program 2: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerL\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01080000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06o\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2961.300385][T17854] 9pnet: Insufficient options for proto=fd 03:47:32 executing program 2: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000020000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerh\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01100000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06p\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2962.155409][T17923] 9pnet: Insufficient options for proto=fd 03:47:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:33 executing program 2: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01020000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerl\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01e00000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2962.974194][ T26] kauditd_printk_skb: 240 callbacks suppressed [ 2962.974215][ T26] audit: type=1400 audit(2000000854.019:114076): avc: denied { map } for pid=17932 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2962.995649][ T26] audit: type=1400 audit(2000000854.039:114077): avc: denied { map } for pid=17931 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06s\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2963.219716][T17952] 9pnet: Insufficient options for proto=fd [ 2963.257027][ T26] audit: type=1400 audit(2000000854.039:114078): avc: denied { map } for pid=17931 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:34 executing program 2: pipe2$9p(0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2963.437356][ T26] audit: type=1400 audit(2000000854.039:114079): avc: denied { map } for pid=17932 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01040000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2963.609545][ T26] audit: type=1400 audit(2000000854.109:114080): avc: denied { map } for pid=17938 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallert\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2963.776732][ T26] audit: type=1400 audit(2000000854.109:114081): avc: denied { map } for pid=17938 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2963.980003][ T26] audit: type=1400 audit(2000000854.129:114082): avc: denied { map } for pid=17938 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06x\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2964.096490][ T26] audit: type=1400 audit(2000000854.149:114083): avc: denied { map } for pid=17938 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2964.265727][ T26] audit: type=1400 audit(2000000854.179:114084): avc: denied { map } for pid=17940 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2964.334068][T18140] 9pnet: Insufficient options for proto=fd 03:47:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkallerz\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01f00000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01050000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2964.434653][ T26] audit: type=1400 audit(2000000854.179:114085): avc: denied { map } for pid=17940 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:35 executing program 2: pipe2$9p(0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x89\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\t/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000300000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2965.290422][T18257] 9pnet: Insufficient options for proto=fd 03:47:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01080000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:36 executing program 2: pipe2$9p(0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01460300000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\n/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\x93\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010a0000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xa7\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01470300000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2966.575371][T18302] 9pnet: Insufficient options for proto=fd 03:47:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\v/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:37 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010e0000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000500000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xab\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x14/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2967.984990][ T26] kauditd_printk_skb: 219 callbacks suppressed [ 2967.985006][ T26] audit: type=1400 audit(2000000859.029:114305): avc: denied { map } for pid=18319 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:39 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x04\x1b/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2968.207920][ T26] audit: type=1400 audit(2000000859.109:114306): avc: denied { map } for pid=18319 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01100000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xbc\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01960600000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2968.415653][ T26] audit: type=1400 audit(2000000859.109:114307): avc: denied { map } for pid=18319 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2968.585648][ T26] audit: type=1400 audit(2000000859.129:114308): avc: denied { prog_load } for pid=18321 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2968.815642][ T26] audit: type=1400 audit(2000000859.139:114309): avc: denied { map } for pid=18323 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2968.960923][ T26] audit: type=1400 audit(2000000859.139:114310): avc: denied { map } for pid=18323 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2969.142824][ T26] audit: type=1400 audit(2000000859.169:114311): avc: denied { prog_load } for pid=18321 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2969.275270][T18344] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2969.292556][T18394] audit: audit_backlog=65 > audit_backlog_limit=64 03:47:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00 /\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2969.304242][ T26] audit: type=1400 audit(2000000859.169:114312): avc: denied { map } for pid=18319 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01600000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\x93\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01c00e00000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:40 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06i/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01e00000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01001f00000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x02\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x01\x7f/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:42 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a018e2700000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x03\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01f00000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x04\x80/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01034600000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01460300000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x04\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:43 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06\x93/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2973.039035][ T26] kauditd_printk_skb: 241 callbacks suppressed [ 2973.039048][ T26] audit: type=1400 audit(2000000864.089:114544): avc: denied { map } for pid=18501 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2973.200073][ T26] audit: type=1400 audit(2000000864.099:114545): avc: denied { map } for pid=18501 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x05\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01470300000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2973.369527][ T26] audit: type=1400 audit(2000000864.119:114546): avc: denied { map } for pid=18501 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2973.537969][ T26] audit: type=1400 audit(2000000864.129:114547): avc: denied { map } for pid=18501 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2973.747188][ T26] audit: type=1400 audit(2000000864.169:114548): avc: denied { prog_load } for pid=18502 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2973.977941][ T26] audit: type=1400 audit(2000000864.179:114549): avc: denied { map } for pid=18501 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x06\xb0/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01034700000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2974.123955][ T26] audit: type=1400 audit(2000000864.219:114550): avc: denied { map } for pid=18501 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:45 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2974.341484][ T26] audit: type=1400 audit(2000000864.219:114551): avc: denied { map } for pid=18501 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x06\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2974.491813][T18622] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2974.561464][ T26] audit: type=1400 audit(2000000864.229:114552): avc: denied { prog_load } for pid=18502 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000500000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01914c00000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\t/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\a\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000a00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:47 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\n/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\b\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000e00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01278e00000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\v/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01c00e00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a014c9100000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\t\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:48 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\n\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x14/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2978.052034][ T26] kauditd_printk_skb: 245 callbacks suppressed [ 2978.052049][ T26] audit: type=1400 audit(2000000869.099:114790): avc: denied { map } for pid=18886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2978.207134][ T26] audit: type=1400 audit(2000000869.099:114791): avc: denied { map } for pid=18886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2978.359557][ T26] audit: type=1400 audit(2000000869.159:114792): avc: denied { map } for pid=18887 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01001f00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2978.518821][ T26] audit: type=1400 audit(2000000869.159:114793): avc: denied { map } for pid=18887 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2978.704719][ T26] audit: type=1400 audit(2000000869.159:114794): avc: denied { map } for pid=18887 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:49 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01069600000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2978.933392][ T26] audit: type=1400 audit(2000000869.189:114795): avc: denied { map } for pid=18886 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\v\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2979.124689][ T26] audit: type=1400 audit(2000000869.189:114796): avc: denied { map } for pid=18886 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\a\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2979.307812][T19002] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2979.343218][T19000] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2979.365689][ T26] audit: type=1400 audit(2000000869.199:114797): avc: denied { map } for pid=18887 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a018e2700000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\f\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010ec000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/%\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:51 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01bc3200000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\r\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100e000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1e\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01003f00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x0e\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100f000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:53 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x02E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01034600000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x0f\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01004003000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01034700000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2983.057309][ T26] kauditd_printk_skb: 275 callbacks suppressed [ 2983.057325][ T26] audit: type=1400 audit(2000000874.109:115045): avc: denied { prog_load } for pid=19063 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x10\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:54 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x03E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2983.315731][ T26] audit: type=1400 audit(2000000874.109:115046): avc: denied { map } for pid=19060 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2983.475686][ T26] audit: type=1400 audit(2000000874.109:115047): avc: denied { map } for pid=19062 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2983.625685][ T26] audit: type=1400 audit(2000000874.189:115049): avc: denied { map } for pid=19062 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2983.804873][ T26] audit: type=1400 audit(2000000874.179:115048): avc: denied { prog_load } for pid=19063 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2983.994868][ T26] audit: type=1400 audit(2000000874.199:115050): avc: denied { map } for pid=19062 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01914c00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x11\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2984.143519][ T26] audit: type=1400 audit(2000000874.299:115051): avc: denied { map } for pid=19062 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x05E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2984.290002][ T26] audit: type=1400 audit(2000000874.299:115052): avc: denied { map } for pid=19062 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2984.481657][ T26] audit: type=1400 audit(2000000874.409:115053): avc: denied { map } for pid=19067 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000340000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2984.690593][ T26] audit: type=1400 audit(2000000874.409:115054): avc: denied { map } for pid=19067 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01006000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:56 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f2431"], 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x12\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01fffff0000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x06E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01278e00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000010000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x13\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\aE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2986.585243][T19205] 9pnet: p9_errstr2errno: server reported unknown error ezo$1 03:47:57 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f2431"], 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:47:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a014c9100000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:47:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000020000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x14\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\bE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:47:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x15\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000030000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\tE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2988.077798][ T26] kauditd_printk_skb: 247 callbacks suppressed [ 2988.077814][ T26] audit: type=1400 audit(2000000879.129:115302): avc: denied { map } for pid=19286 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x16\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:47:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0132bc00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2988.235672][ T26] audit: type=1400 audit(2000000879.139:115303): avc: denied { map } for pid=19314 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2988.352487][T19234] 9pnet: p9_errstr2errno: server reported unknown error ezo$1 03:47:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2988.410566][ T26] audit: type=1400 audit(2000000879.149:115304): avc: denied { prog_load } for pid=19310 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:47:59 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f2431"], 0xf) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2988.565805][ T26] audit: type=1400 audit(2000000879.169:115305): avc: denied { map } for pid=19314 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:47:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000040000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:47:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\nE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2988.775661][ T26] audit: type=1400 audit(2000000879.169:115306): avc: denied { map } for pid=19286 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2988.941422][ T26] audit: type=1400 audit(2000000879.179:115307): avc: denied { map } for pid=19314 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x17\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2989.118007][ T26] audit: type=1400 audit(2000000879.179:115308): avc: denied { prog_load } for pid=19310 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010ec000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2989.287265][ T26] audit: type=1400 audit(2000000879.219:115309): avc: denied { map } for pid=19314 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2989.447455][ T26] audit: type=1400 audit(2000000879.229:115310): avc: denied { map } for pid=19314 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000050000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2989.578411][ T26] audit: type=1400 audit(2000000879.229:115311): avc: denied { map } for pid=19286 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\vE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x18\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2990.067825][T19362] 9pnet: p9_errstr2errno: server reported unknown error ezo$1 03:48:01 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8"], 0x16) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100e000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x12E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x19\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100f000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000080000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:02 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8"], 0x16) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x14E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x1a\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01004003000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1cSE\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000100000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2992.507949][T19711] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸ 03:48:03 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8"], 0x16) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x1b\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2993.113662][ T26] kauditd_printk_skb: 225 callbacks suppressed [ 2993.113676][ T26] audit: type=1400 audit(2000000884.159:115537): avc: denied { map } for pid=19713 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000340000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000001f0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2993.298358][ T26] audit: type=1400 audit(2000000884.179:115538): avc: denied { map } for pid=19713 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04\t\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2993.415894][T19723] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸ 03:48:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x1c\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2993.464169][ T26] audit: type=1400 audit(2000000884.209:115539): avc: denied { map } for pid=19713 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:04 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe4"], 0x1a) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2993.642235][ T26] audit: type=1400 audit(2000000884.209:115540): avc: denied { map } for pid=19713 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2993.809775][ T26] audit: type=1400 audit(2000000884.229:115541): avc: denied { prog_load } for pid=19715 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2993.986315][ T26] audit: type=1400 audit(2000000884.259:115542): avc: denied { prog_load } for pid=19715 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01fffff0000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2994.181173][ T26] audit: type=1400 audit(2000000884.439:115543): avc: denied { prog_load } for pid=19724 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000003460000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2994.362867][ T26] audit: type=1400 audit(2000000884.459:115545): avc: denied { map } for pid=19722 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x02\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x1d\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2994.592855][ T26] audit: type=1400 audit(2000000884.459:115544): avc: denied { prog_load } for pid=19724 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2994.731639][ T26] audit: type=1400 audit(2000000884.459:115546): avc: denied { map } for pid=19722 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000010000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000003470000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:06 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe4"], 0x1a) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x03\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\x1e\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000020000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000278e0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2996.093603][T19865] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëä 03:48:07 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe4"], 0x1a) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12%\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x04\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100004c910000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2997.152171][T19950] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëä 03:48:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12/\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:08 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec3"], 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x05\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000040000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000006960000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2998.118555][ T26] kauditd_printk_skb: 221 callbacks suppressed [ 2998.118570][ T26] audit: type=1400 audit(2000000889.169:115762): avc: denied { prog_load } for pid=20050 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\xab\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x06\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000050000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2998.305637][ T26] audit: type=1400 audit(2000000889.199:115763): avc: denied { map } for pid=20057 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.332577][T20100] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëänà 03:48:09 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec3"], 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2998.485688][ T26] audit: type=1400 audit(2000000889.209:115764): avc: denied { map } for pid=20078 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.649126][ T26] audit: type=1400 audit(2000000889.219:115765): avc: denied { map } for pid=20057 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.839397][ T26] audit: type=1400 audit(2000000889.229:115766): avc: denied { prog_load } for pid=20072 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01ffffff9e0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 2999.015695][ T26] audit: type=1400 audit(2000000889.229:115767): avc: denied { map } for pid=20078 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\a\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12\xbc\x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 2999.180801][ T26] audit: type=1400 audit(2000000889.259:115768): avc: denied { map } for pid=20057 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000080000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 2999.346185][ T26] audit: type=1400 audit(2000000889.289:115769): avc: denied { map } for pid=20057 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2999.355714][T20116] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëänà 03:48:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 2999.519844][ T26] audit: type=1400 audit(2000000889.299:115770): avc: denied { map } for pid=20078 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:10 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec3"], 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2999.691047][ T26] audit: type=1400 audit(2000000889.319:115771): avc: denied { map } for pid=20057 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\x94\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\b\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000000a0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 3000.489124][T20205] 9pnet: p9_errstr2errno: server reported unknown error ezo$1H±&¡#—¸µzëänà 03:48:11 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100000ec00000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a\x93\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\t\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000000e0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:12 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000e00000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a\xa7\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\n\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000100000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:13 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01fffffff00000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\v\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a\xbc\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000001f0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:14 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 3003.126691][ T26] kauditd_printk_skb: 229 callbacks suppressed [ 3003.126707][ T26] audit: type=1400 audit(2000000894.169:115986): avc: denied { map } for pid=20276 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.332539][ T26] audit: type=1400 audit(2000000894.259:115987): avc: denied { map } for pid=20276 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.505395][ T26] audit: type=1400 audit(2000000894.289:115988): avc: denied { map } for pid=20276 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000003f0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 3003.717872][ T26] audit: type=1400 audit(2000000894.299:115989): avc: denied { map } for pid=20276 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\f\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\x93\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3003.928784][ T26] audit: type=1400 audit(2000000894.339:115990): avc: denied { map } for pid=20276 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:15 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 3004.085860][ T26] audit: type=1400 audit(2000000894.339:115991): avc: denied { map } for pid=20276 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3004.295638][ T26] audit: type=1400 audit(2000000894.419:115992): avc: denied { map } for pid=20278 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01fffffffe0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 3004.450798][ T26] audit: type=1400 audit(2000000894.429:115993): avc: denied { map } for pid=20278 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3004.505111][T20395] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3004.546932][T20399] audit: audit_backlog=65 > audit_backlog_limit=64 03:48:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x98#\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\r\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000003460000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:16 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000003470000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x0e\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x98+\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000ffff0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:17 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x0f\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x98-\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000600000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100f0ffff0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:18 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x10\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x980\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000278e0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a019effffff0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 3008.173368][ T26] kauditd_printk_skb: 260 callbacks suppressed [ 3008.173384][ T26] audit: type=1400 audit(2000000899.219:116241): avc: denied { map } for pid=20554 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3008.360816][ T26] audit: type=1400 audit(2000000899.259:116242): avc: denied { map } for pid=20554 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\a\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:19 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x11\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3008.535064][ T26] audit: type=1400 audit(2000000899.269:116243): avc: denied { map } for pid=20554 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100004c910000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01f0ffffff0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 3008.707565][ T26] audit: type=1400 audit(2000000899.289:116244): avc: denied { prog_load } for pid=20555 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3008.920071][ T26] audit: type=1400 audit(2000000899.319:116246): avc: denied { map } for pid=20554 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 3009.152969][ T26] audit: type=1400 audit(2000000899.309:116245): avc: denied { prog_load } for pid=20555 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3009.364449][ T26] audit: type=1400 audit(2000000899.329:116247): avc: denied { map } for pid=20554 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3009.380211][T20571] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3009.397451][T20575] audit: audit_backlog=66 > audit_backlog_limit=64 [ 3009.401562][T20576] audit: audit_backlog=66 > audit_backlog_limit=64 03:48:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983%\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:20 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, 0x0) 03:48:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x12\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01ffffff9e0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01feffffff0000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:21 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, 0x0) 03:48:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4#\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000018000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x13\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000032bc0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:22 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, 0x0) 03:48:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4>\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000000000000ec000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x14\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100000ec00000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:23 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xb0\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000ffff00f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x15\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000e00000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 3012.817735][T20636] 9pnet: Insufficient options for proto=fd 03:48:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:24 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xb4\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3013.179961][ T26] kauditd_printk_skb: 277 callbacks suppressed [ 3013.179975][ T26] audit: type=1400 audit(2000000904.229:116492): avc: denied { map } for pid=20635 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3013.394440][ T26] audit: type=1400 audit(2000000904.239:116494): avc: denied { map } for pid=20638 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x16\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3013.537389][ T26] audit: type=1400 audit(2000000904.239:116493): avc: denied { map } for pid=20635 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01fffffff00000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 3013.694552][ T26] audit: type=1400 audit(2000000904.259:116495): avc: denied { map } for pid=20642 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3013.814603][ T26] audit: type=1400 audit(2000000904.279:116496): avc: denied { map } for pid=20642 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3013.942741][T20740] 9pnet: Insufficient options for proto=fd [ 3013.990705][ T26] audit: type=1400 audit(2000000904.289:116497): avc: denied { map } for pid=20642 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000200000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xb5\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:25 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x17\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3014.127186][ T26] audit: type=1400 audit(2000000904.359:116498): avc: denied { map } for pid=20642 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 3014.292228][ T26] audit: type=1400 audit(2000000904.399:116499): avc: denied { prog_load } for pid=20641 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a010000ffff0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 3014.435864][ T26] audit: type=1400 audit(2000000904.439:116500): avc: denied { map } for pid=20642 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.595650][ T26] audit: type=1400 audit(2000000904.449:116501): avc: denied { map } for pid=20642 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000300000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 3014.874062][T20768] 9pnet: Insufficient options for proto=fd 03:48:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xd7\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:26 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x18\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100f0ffff0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000400000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xf1\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3015.987434][T20785] 9pnet: Insufficient options for proto=fd 03:48:27 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x19\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a019effffff0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000500000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1a\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xf8\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3017.033694][T20805] 9pnet: Insufficient options for proto=fd 03:48:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:28 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 03:48:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01f0ffffff0000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xfd\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000800000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1b\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000018000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:29 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 3018.548395][ T26] kauditd_printk_skb: 217 callbacks suppressed [ 3018.548410][ T26] audit: type=1400 audit(2000000909.599:116719): avc: denied { map } for pid=20922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3018.778768][ T26] audit: type=1400 audit(2000000909.659:116720): avc: denied { map } for pid=20922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8\"\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1c\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3018.929332][ T26] audit: type=1400 audit(2000000909.659:116721): avc: denied { map } for pid=20922 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01001000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 3019.085275][ T26] audit: type=1400 audit(2000000909.659:116722): avc: denied { map } for pid=20922 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000ffff00f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 3019.257107][ T26] audit: type=1400 audit(2000000909.719:116723): avc: denied { map } for pid=20924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:30 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 3019.427068][ T26] audit: type=1400 audit(2000000909.719:116724): avc: denied { map } for pid=20924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3019.575165][ T26] audit: type=1400 audit(2000000909.749:116726): avc: denied { prog_load } for pid=20923 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:48:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x7f\x01y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3019.749948][ T26] audit: type=1400 audit(2000000909.729:116725): avc: denied { map } for pid=20926 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1d\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3019.879449][ T26] audit: type=1400 audit(2000000909.759:116728): avc: denied { map } for pid=20926 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100e000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 3020.033087][ T26] audit: type=1400 audit(2000000909.759:116729): avc: denied { map } for pid=20926 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000200000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:31 executing program 2: pipe2$9p(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2300000007ffff160065077a6f243148b126a12397b8b57aebe46ec317"], 0x1d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:48:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x80\x01y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\x1e\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000400000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a0100f000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x80\x04y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000500000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17%\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000003000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:33 executing program 2: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x9100105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/26, 0x1a}], 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, 0x0, &(0x7f0000000140)) 03:48:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) 03:48:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8yc\x06y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17/\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000800000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01004603000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x02\x00\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000a00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) [ 3023.557554][ T26] kauditd_printk_skb: 248 callbacks suppressed [ 3023.557570][ T26] audit: type=1400 audit(2000000914.609:116962): avc: denied { map } for pid=21152 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:34 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11200000000009000007000000000000000000000000385a5800000000000000000000000000006dbd0060152443d61a2236f4ee2687bf8ad6da"], 0x5c) 03:48:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\xab\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3023.765717][ T26] audit: type=1400 audit(2000000914.609:116963): avc: denied { map } for pid=21152 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 3023.897961][ T26] audit: type=1400 audit(2000000914.669:116964): avc: denied { map } for pid=21150 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3024.067271][ T26] audit: type=1400 audit(2000000914.669:116965): avc: denied { map } for pid=21150 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3024.223364][T21248] kasan: CONFIG_KASAN_INLINE enabled [ 3024.285058][ T26] audit: type=1400 audit(2000000914.669:116966): avc: denied { prog_load } for pid=21185 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3024.318441][T21248] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 3024.406644][T21248] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 3024.413832][T21248] CPU: 1 PID: 21248 Comm: syz-executor.2 Not tainted 5.1.0-rc1+ #32 [ 3024.421805][T21248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3024.431963][T21248] RIP: 0010:ebitmap_destroy+0x32/0xf0 [ 3024.437429][T21248] Code: 49 89 fd 41 54 53 e8 fd d3 7f fe 4d 85 ed 0f 84 99 00 00 00 e8 ef d3 7f fe 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 98 00 00 00 49 be 00 00 00 00 00 fc ff df 4d 8b [ 3024.457208][T21248] RSP: 0018:ffff8880288c78c8 EFLAGS: 00010202 [ 3024.463274][T21248] RAX: dffffc0000000000 RBX: ffff8880a9ae66a8 RCX: ffffc9000a289000 [ 3024.471244][T21248] RDX: 0000000000000002 RSI: ffffffff82f09ba1 RDI: 0000000000000010 [ 3024.473895][ T26] audit: type=1400 audit(2000000914.709:116967): avc: denied { prog_load } for pid=21185 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3024.479213][T21248] RBP: ffff8880288c78e8 R08: ffff88805841c280 R09: ffff88805841cb70 [ 3024.479221][T21248] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 [ 3024.479230][T21248] R13: 0000000000000010 R14: ffffed101535cd0a R15: 0000000000585a38 [ 3024.479241][T21248] FS: 00007fb67fbf3700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 3024.479249][T21248] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3024.479257][T21248] CR2: 00007fb3ac31c6f0 CR3: 000000000f685000 CR4: 00000000001406e0 [ 3024.479265][T21248] Call Trace: [ 3024.479286][T21248] policydb_destroy+0x62c/0x7f0 [ 3024.479305][T21248] policydb_read+0xe27/0x52c0 [ 3024.563026][T21248] ? prep_new_page+0x122/0x300 [ 3024.567811][T21248] ? cond_index_bool+0x1a0/0x1a0 [ 3024.572849][T21248] ? string_to_av_perm+0xa0/0xa0 [ 3024.577801][T21248] ? security_load_policy+0x185/0x1170 [ 3024.583266][T21248] ? rcu_read_lock_sched_held+0x110/0x130 [ 3024.588989][T21248] ? kmem_cache_alloc_trace+0x354/0x760 [ 3024.594546][T21248] security_load_policy+0x36d/0x1170 [ 3024.600197][T21248] ? security_change_sid+0x150/0x150 [ 3024.605588][T21248] ? find_held_lock+0x35/0x130 [ 3024.610390][T21248] ? __might_fault+0x12b/0x1e0 [ 3024.615181][T21248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3024.621542][T21248] ? _copy_from_user+0xdd/0x150 [ 3024.626749][T21248] sel_write_load+0x25a/0x470 [ 3024.631435][T21248] __vfs_write+0x8d/0x110 [ 3024.635931][T21248] ? sel_make_policy_nodes+0x1540/0x1540 [ 3024.641573][T21248] vfs_write+0x20c/0x580 [ 3024.645822][T21248] ksys_write+0xea/0x1f0 [ 3024.650079][T21248] ? __ia32_sys_read+0xb0/0xb0 [ 3024.654854][T21248] ? do_syscall_64+0x26/0x610 [ 3024.659534][T21248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3024.665602][T21248] ? do_syscall_64+0x26/0x610 [ 3024.670391][T21248] __x64_sys_write+0x73/0xb0 [ 3024.670498][ T26] audit: type=1400 audit(2000000914.889:116968): avc: denied { map } for pid=21209 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3024.674987][T21248] do_syscall_64+0x103/0x610 [ 3024.675005][T21248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3024.675016][T21248] RIP: 0033:0x458209 [ 3024.675036][T21248] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3024.732060][T21248] RSP: 002b:00007fb67fbf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3024.740480][T21248] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 3024.748454][T21248] RDX: 000000000000005c RSI: 00000000200000c0 RDI: 0000000000000003 03:48:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000e00000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00\"\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) 03:48:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17\xbc\xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3024.753488][ T3875] kobject: 'loop1' (00000000d832a91c): kobject_uevent_env [ 3024.756428][T21248] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3024.756437][T21248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb67fbf36d4 [ 3024.756446][T21248] R13: 00000000004c76f5 R14: 00000000004dd348 R15: 00000000ffffffff [ 3024.756458][T21248] Modules linked in: 03:48:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01004703000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 03:48:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x100008000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01001000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1) 03:48:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 3024.903863][ T26] audit: type=1400 audit(2000000914.899:116969): avc: denied { map } for pid=21209 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3024.941579][ T3875] kobject: 'loop1' (00000000d832a91c): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:48:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b.\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x02y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3024.956581][ T26] audit: type=1400 audit(2000000914.909:116970): avc: denied { map } for pid=21209 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:48:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x200001c8}}, &(0x7f00000000c0)='syzkaller\x00\x06/\x15\x1c\x04E\x17 \xe4O\xae\x1b\"\xe7\x96:\x16\x9c\bV\x95W\xe5\xd9\xafrqP\v\xd2Ip\x16\x06u\x88\x0e\xa5\xb5\xb7\xf9\xbd\x8dM\xf4\xfa\x12 \x80\xa9\xe9\x9a>\xf4\x9a\xbd\x983\x15\xf6\x87\x95\xa4\xbc\xd8y\x11\x00y\xf9i\x805\xb8\x9e\x17\xe4\xe1j\x85u\xe6\x12\x17I+k\xba8_\x1a\xcb\x93\x99\x13\x95\x11\xf2\xcd,\xd8\f\xd8O\xf2\x97\x83\x12\xc7\xd4\x91\x13E-\xc7@\x11JE\xa9\x93\xf9S,\xdcn\x8eh\xef\x8d\x9e_'}, 0x42b) [ 3025.009182][ T3875] kobject: 'loop4' (00000000fe4a044c): kobject_uevent_env [ 3025.024978][T21336] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3025.034614][ T3875] kobject: 'loop4' (00000000fe4a044c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3025.043298][T21248] ---[ end trace 8020a6db418f671a ]--- 03:48:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0x0, 'team0\x00', 'gre0\x00', 'ip6tnl0\x00', 'vlan0\x00\x00\x00\x16\x00\x00\x00\x12\x00', @link_local, [], @link_local, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'team0\x00', 'eql\x00'}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "a75e3379780818d673bdcf0405858882ab413abf6da5467650feaff4c1e8"}}}}]}]}, 0x238) [ 3025.071282][ T3875] kobject: 'loop5' (0000000053e49f23): kobject_uevent_env [ 3025.092445][ T3875] kobject: 'loop5' (0000000053e49f23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3025.123827][ T3875] kobject: 'loop3' (00000000c55f41b5): kobject_uevent_env [ 3025.131120][ T3875] kobject: 'loop3' (00000000c55f41b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3025.147429][ T3875] kobject: 'loop0' (0000000089a4e696): kobject_uevent_env [ 3025.154607][ T3875] kobject: 'loop0' (0000000089a4e696): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 3025.186841][ T3875] kobject: 'loop5' (0000000053e49f23): kobject_uevent_env [ 3025.195978][ T3875] kobject: 'loop5' (0000000053e49f23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3025.223379][ T3875] kobject: 'loop3' (00000000c55f41b5): kobject_uevent_env [ 3025.238374][T21248] RIP: 0010:ebitmap_destroy+0x32/0xf0 [ 3025.244114][ T3875] kobject: 'loop3' (00000000c55f41b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3025.256618][T21248] Code: 49 89 fd 41 54 53 e8 fd d3 7f fe 4d 85 ed 0f 84 99 00 00 00 e8 ef d3 7f fe 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 98 00 00 00 49 be 00 00 00 00 00 fc ff df 4d 8b [ 3025.281567][ T3875] kobject: 'loop1' (00000000d832a91c): kobject_uevent_env [ 3025.296107][ T3875] kobject: 'loop1' (00000000d832a91c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3025.326821][T21248] RSP: 0018:ffff8880288c78c8 EFLAGS: 00010202 [ 3025.344153][T21248] RAX: dffffc0000000000 RBX: ffff8880a9ae66a8 RCX: ffffc9000a289000 [ 3025.352232][ T3875] kobject: 'loop0' (0000000089a4e696): kobject_uevent_env [ 3025.352293][ T3875] kobject: 'loop0' (0000000089a4e696): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 3025.363447][T21248] RDX: 0000000000000002 RSI: ffffffff82f09ba1 RDI: 0000000000000010 [ 3025.381779][T21248] RBP: ffff8880288c78e8 R08: ffff88805841c280 R09: ffff88805841cb70 [ 3025.384776][ T3875] kobject: 'loop4' (00000000fe4a044c): kobject_uevent_env [ 3025.397342][ T3875] kobject: 'loop4' (00000000fe4a044c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3025.403733][T21248] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 [ 3025.418290][T21248] R13: 0000000000000010 R14: ffffed101535cd0a R15: 0000000000585a38 [ 3025.429363][T21248] FS: 00007fb67fbf3700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 3025.439568][T21248] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3025.459112][T21248] CR2: 00007ffd1f69af28 CR3: 000000000f685000 CR4: 00000000001406f0 [ 3025.476947][T21248] Kernel panic - not syncing: Fatal exception [ 3025.483853][T21248] Kernel Offset: disabled [ 3025.488262][T21248] Rebooting in 86400 seconds..