last executing test programs: 1h52m46.239419433s ago: executing program 1 (id=5686): r0 = openat$mice(0xffffff9c, 0x0, 0x2100) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x88, 0xa, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x4}, @NFTA_SET_POLICY={0x8}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xf}, @NFTA_SET_EXPRESSIONS={0x34, 0x12, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @quota={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}]}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x5}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x4}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x26}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x3}]}, 0x88}, 0x1, 0x0, 0x0, 0x24000010}, 0x10) 1h52m45.938548795s ago: executing program 1 (id=5687): pipe2$watch_queue(0x0, 0xb82e336200000000) r0 = io_uring_setup(0x1666, &(0x7f0000000500)={0x0, 0x1eea, 0x2, 0x20000003, 0x208}) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x2089c1, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r5, &(0x7f00000022c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000002340)=0x80) write$FUSE_DIRENT(r6, 0x0, 0x0) r7 = fcntl$dupfd(r4, 0x0, r3) r8 = accept4$packet(r7, 0x0, 0x0, 0x0) openat$cgroup_pressure(r7, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r8, 0x5450, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) shutdown(r2, 0x0) 1h52m44.990470473s ago: executing program 1 (id=5688): r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8904, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$setsig(r1, 0xa, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000380)) r3 = socket(0x1d, 0x2, 0x6) openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/fscaps', 0x0, 0x0) ioctl$IOMMU_IOAS_COPY$syz(r5, 0x5451, 0x0) bind$can_j1939(r3, &(0x7f00000000c0)={0x1d, r4, 0x2, {0x0, 0x1, 0x2}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x10) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x8, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x88000) 1h52m42.337285631s ago: executing program 1 (id=5693): pipe(&(0x7f0000000000)) r0 = syz_open_dev$hiddev(&(0x7f0000000040), 0x4, 0x4000) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r1, 0x2, &(0x7f0000000380)) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) ioctl$HIDIOCSREPORT(r0, 0x400c4808, &(0x7f0000000080)={0x3, 0xffffffff}) inotify_init1(0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r3, r2, 0x0) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000080)="ce", 0x1}], 0x1}, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5450, 0x0) 1h52m42.07836107s ago: executing program 1 (id=5694): r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) getpeername(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000180)=0x80) ioctl$KDSKBLED(r3, 0x5450, 0x0) r4 = openat$sw_sync(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r4, 0xc0285700, &(0x7f00000000c0)={0x0, "7409321cb8a96787fda7d1bba2ce949c1143a930b15c01ee3b6b514e96f2330c", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r5, 0xc0303e03, &(0x7f0000000100)={"0c054e57c713ccb74c4f22c740c0ffe8d414777b098d9f00", r5, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r7) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000240)) sendmsg$NL80211_CMD_SET_MPATH(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4040880}, 0x8080) ioctl$SYNC_IOC_MERGE(r6, 0xc0303e03, &(0x7f00000001c0)={"f70ddbafba1cef9273568e2cd188f80d02854b27e555f157fbf1ee1c823cf66d", r5, 0xffffffffffffffff}) r9 = openat$comedi(0xffffff9c, &(0x7f0000000000)='/dev/comedi1\x00', 0x121100, 0x0) r10 = dup(r9) ioctl$UI_END_FF_ERASE(r10, 0x400c55cb, 0x0) fcntl$F_GET_RW_HINT(r8, 0x40b, &(0x7f0000000080)) ioctl$FS_IOC_RESVSP(r0, 0x5421, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffa}) 1h52m41.58900997s ago: executing program 1 (id=5695): r0 = openat$mice(0xffffff9c, &(0x7f0000000000), 0x2100) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, 0x0, 0x10) 1h52m41.588803421s ago: executing program 32 (id=5695): r0 = openat$mice(0xffffff9c, &(0x7f0000000000), 0x2100) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, 0x0, 0x10) 1h6m56.510068813s ago: executing program 0 (id=10976): r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001340)={0xffffffffffffffff}) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x989680}}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x8002, 0x0) fcntl$notify(r3, 0x402, 0x0) futex(&(0x7f0000000700)=0x2, 0x0, 0x2, &(0x7f0000000740)={0x0, 0x3938700}, 0x0, 0x0) nanosleep(&(0x7f0000004040)={0x77359400}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r5, &(0x7f00000019c0)="3b1cc885", 0x4, 0x40, &(0x7f0000001a40)=@nl=@unspec, 0x80) close(r4) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r7, 0x0) connect$unix(r6, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$cgroup_pressure(r4, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x40) 1h6m55.249681323s ago: executing program 0 (id=10978): r0 = memfd_create(&(0x7f0000000000)='blkio.bfq.avg_queue_size\x00', 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r1, 0x5452, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) r2 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000180)={'macsec0\x00', 0x72e8}) getsockname(r3, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0xfffffffffffffe97) getsockopt$inet6_mreq(r5, 0x29, 0x1c, &(0x7f00000001c0)={@private0, 0x0}, &(0x7f0000000240)=0x14) setsockopt$MRT_ADD_VIF(r5, 0x0, 0xca, &(0x7f0000000280)={0x0, 0x8, 0x6, 0x4930, @vifc_lcl_ifindex=r6, @local}, 0x10) dup3(r4, r5, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20008040}, 0x0) fcntl$addseals(r2, 0x406, 0x0) 1h6m54.931927676s ago: executing program 0 (id=10980): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) close_range(r0, r0, 0x0) r1 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x3, {0x2, 0x1}}, 0x18) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000d40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000d00)={&(0x7f0000001480)={0xe98, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x25c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8bb5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffff00}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x800, 0xd2, 0x5, 0x3f}, {0x8, 0x81, 0x8, 0x48}, {0x1c, 0x7, 0x9, 0x55}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x75}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4dd4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0xe566, 0x3, 0xec, 0x8e}, {0x4, 0x0, 0x8, 0x100}, {0x6, 0xa, 0xf, 0x6}, {0x8, 0xf, 0x1a, 0x1000}, {0x0, 0x8, 0x1, 0x7fff}, {0xfffb, 0x6, 0xf, 0x1}, {0x10, 0x6, 0x1, 0x4}, {0x8, 0xae, 0x8, 0x1}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x210, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x18}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xf0b7}}}]}}, {{0x8}, {0x180, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0xe98}, 0x1, 0x0, 0x0, 0x5}, 0x4008811) 1h6m54.642088227s ago: executing program 0 (id=10982): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x22) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) chroot(&(0x7f00000000c0)='./file0\x00') syz_fuse_handle_req(r0, &(0x7f0000004140)="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", 0x2000, &(0x7f00000008c0)={&(0x7f0000000340)={0x50, 0x0, 0x0, {0x7, 0x2b, 0xb2f0, 0x2061890e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000002140)="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", 0x2000, &(0x7f0000000b40)={&(0x7f0000000000)={0x50, 0x0, 0xfffffffffffffff9, {0x7, 0x2b, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80, 0x7}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x2f0a00, 0x0) openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_clone(0x108000, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) close(r0) r1 = timerfd_create(0x0, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r1, 0x0, 0x24004804) 1h6m53.651249897s ago: executing program 0 (id=10986): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) close_range(r0, r0, 0x0) r1 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x3, {0x2, 0x1}}, 0x18) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000d40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000d00)={&(0x7f0000001480)={0xe98, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x25c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8bb5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffff00}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x800, 0xd2, 0x5, 0x3f}, {0x8, 0x81, 0x8, 0x48}, {0x1c, 0x7, 0x9, 0x55}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x75}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4dd4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0xe566, 0x3, 0xec, 0x8e}, {0x4, 0x0, 0x8, 0x100}, {0x6, 0xa, 0xf, 0x6}, {0x8, 0xf, 0x1a, 0x1000}, {0x0, 0x8, 0x1, 0x7fff}, {0xfffb, 0x6, 0xf, 0x1}, {0x10, 0x6, 0x1, 0x4}, {0x8, 0xae, 0x8, 0x1}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x210, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x18}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xf0b7}}}]}}, {{0x8}, {0x180, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0xe98}, 0x1, 0x0, 0x0, 0x5}, 0x4008811) 1h6m53.010655323s ago: executing program 0 (id=10988): fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r1 = syz_open_dev$evdev(&(0x7f0000000540), 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) r2 = openat$selinux_mls(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSISO7816(r2, 0x5450, 0x0) prlimit64(r0, 0x1, &(0x7f0000000040)={0xffffffff, 0x2}, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x194380) r4 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x40, 0x0) r5 = signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) ioctl$TIOCPKT(r5, 0x5452, &(0x7f0000000040)) close(0xffffffffffffffff) socketpair$unix(0x1, 0x200000005, 0x0, 0x0) ioctl$TCSETSF2(r4, 0x5452, &(0x7f0000000280)={0x0, 0x0, 0xfdfffffe, 0x8, 0x0, "defc4d7165228f00000000e7f7ffff000000ff", 0x80000000, 0x1000}) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000001340)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x5, r8, 0x7, r7}, 0x10) setsockopt$SO_J1939_SEND_PRIO(r7, 0x6b, 0x3, &(0x7f0000000080)=0x3, 0x4) ioctl$SNDCTL_MIDI_PRETIME(r3, 0xc0046d00, &(0x7f00000000c0)=0x3) sendmsg$NL80211_CMD_NOTIFY_RADAR(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x40) 1h6m53.009617224s ago: executing program 33 (id=10988): fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r1 = syz_open_dev$evdev(&(0x7f0000000540), 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) r2 = openat$selinux_mls(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSISO7816(r2, 0x5450, 0x0) prlimit64(r0, 0x1, &(0x7f0000000040)={0xffffffff, 0x2}, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x194380) r4 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x40, 0x0) r5 = signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) ioctl$TIOCPKT(r5, 0x5452, &(0x7f0000000040)) close(0xffffffffffffffff) socketpair$unix(0x1, 0x200000005, 0x0, 0x0) ioctl$TCSETSF2(r4, 0x5452, &(0x7f0000000280)={0x0, 0x0, 0xfdfffffe, 0x8, 0x0, "defc4d7165228f00000000e7f7ffff000000ff", 0x80000000, 0x1000}) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000001340)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x5, r8, 0x7, r7}, 0x10) setsockopt$SO_J1939_SEND_PRIO(r7, 0x6b, 0x3, &(0x7f0000000080)=0x3, 0x4) ioctl$SNDCTL_MIDI_PRETIME(r3, 0xc0046d00, &(0x7f00000000c0)=0x3) sendmsg$NL80211_CMD_NOTIFY_RADAR(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x40) 22.510961571s ago: executing program 2 (id=15586): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) connect$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x20040001}, 0x7742ea2c622801e8) 21.141531256s ago: executing program 2 (id=15587): memfd_create(&(0x7f0000000200)='\x9d#\x00%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xaa\x8d\x83;\xeb\xf1\xd0\xce\xe5\x19\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\x90\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\xcbC\x15\xfcp\x11\xda|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\x04\xa0\x05}\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12F\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\x00\x00\x00\x00\x00\x00\x00\x04\t0\xaf\\H\x06x-\x01\x13\xa0\xf9\xe8\xdf;\xb9\x03\x00^!\xc2\xff\xac\xb8\xac\xc5\n4\xe7\xd5\xf5@L\b\xd3\x88\xc7\xb2G\f^B\xfeR/\xd7\xf9a[Y\xe0;5!r\x92?FB\xde\xa0>0\xdc\xa6\xbf\xce\xd6?\x1f%7>i\x8d\xd0Nw=,\xcc<\v\xfd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\xf5+\x1c\'\x06\x00\xd1\xc9k:\x9d\x18cP\x14\xb6\x91AT\xb5w\xe71\xf3\xf8]\xc4\xa6+\xb6\xdcZ\xf2\x82*f\x0etDt\xbf\xa4)\x8e<%\xbcijzt\xf7\x7fN\x8fR\n>\xa0\t\ae\x8d~\xa3!\"\xec&\x83\xec\xac\x01\a\xe9\x17\x0f\xce\x9f}4\xf3P\fx\xa3/]E\xd3\xdbc\xa9\x9d$T\a\x83\n$r\xcf\xf5\xaa\x19\xe2\xb2~\xa3N\x03\x90K\xf7\x9fR_y\x80t\xa2\"!5\xf1R\x90~iLeNm\x9c\\Wv\xe5\xbbK \xc2\xa7wx\xd7\xe1P\a\'<\xa2\x02\x84\xb7\x15\x99\xb4\x85\x9b\xe4\a\xc4\xbe\xe9\xd7~\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\xa1\x95\x8d\xad\x13\x10G\x99 !>\x01BS\x01w\xfc\xba\x1cu\x9d\x1aB\xaam\xddc\x1a`\xaflVlj\xb8G\xeb\xbe\a\xe4\xf38\xfba\xe8\xaf\xaa\x19\xa08\x0e\x80\xe2\x17\xde\x81\xd9fi\xca\xfa5\xb9\xf01{\xf5\xd4;Tj\xe7\xef\xfc\xdfAv\xd4\x9a\x83\xa5^\xbd\xa9\xb3\x9cE\xf3\x00Kg\x8aa\xd9|\xaa\xaa2\xf0/\\\xfb\xdeJ\xc7\x13', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x5450, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000002100), 0x280449c, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000093c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r7, {0x7, 0x1f, 0x0, 0x2066012}}, 0x50) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000006380)="edc74baa85103f1dd987e38c0d797e98e2d08801ab992019790d17a62d3043eea8dbe9abbf3ff93664ee29777e82ffeffbea86789525a5114f89cd94131a643f0c34b8bc0e251ea4332cdb7cde855bdbe2b1119189ac4c15c32076cb0514c16f43439812cbba1066f9b3b3dd9c11229919331a30d2897e7ae24e2454d43df0d3530b0c6d857a25fa0dbd5a5c7987f9779f5c1ee1730e3e6021aeb0746b74d74170dd47d510de09b69cc01e6cd33058f3ac28200b7bd14a6dd1b67d3c6091baed74a61f6fb15f3722241c9b08fa85e1f90c7952fea4c49579d872241404cc72696529fb037b42866a25aab2da279d5c62f83915d2662e69393ecc60f2ca8790c5c64fea2ad70bba18eb3e85206d40aa6555a4cab81646ef5f75baf12ca185d53e727fd85d0688d6addaa71eac3e7c4ae8162bde970fad8a97aa64cbba0dcd6554e500402e3687f61217cf0d9798c8004df865a151ea38b0e620ef806aef0d8f7c1273b5d5ed6879d721e39edb3355bc0005937f45bd15f6278fb73facc602d9cf8bf47c0156b274b2abad559aaae6d4fc1959e5fc8eec947e21fb7e9f01e7d0fadf019f56575a1497e3f3be298d82429d31abdf812fb0a8cc4bbf58641aecc3ce7da230c4acbc260ff509d39d08fe590cb9476832e7cf8a61f0e916a3247234e91cb4e0998b186dd06527e4cbd23e42c7a6e5c5b34c9771801e4e9aed9dca5a4174c85cea25cae8df00cdbc2f59c7627909a2929238ddae8a9b169682d0519fea2792a2fd9dc4c9cd477090be7a8c19d0342e944317f58de30bbca2cf683c1dee2040121d402afb303cb5219eac7a45930df42934baf0daf46ee634745b6b11ed15430f26612a56896e047c8de46da5714c9b74616f0e82f3e43989cc0c774365dbee3f3e84b74c5a16b92fbd2ec5f1d5b9116d1226fcc4c43c784269b40e25e131d115f322ad91c7aafc785c255dc2b3abf0922902a370d8b75abec43d4ef285e0cabdaa3c4016a27ffe9cf4753c85dc0197d3034d2b36085e195da8daf9d2ad18c6b5edad0dca971f4a46902a1ee9d4463a9553a7c9798f7e169b5040a980b2a5eebad691564e0e413cbb6e1df6be066a95d4d7bb6f37ba967e0a1cc014b4d61f291144f26fffd2a7361f9008b24aac64799146c1323da13f6c84948bedf57ff92f310f869d60b38dbd96ca6dc49f16273512784caa6339fd9da8ec253d400be3f71f00407508c632f306a2b406d16792e0fc266d5189cb445f301d13b9ac17f125f87ae945bb5d9b03e6c748575f5990ba864eeb0e4ff7bfe2743c8b941ad7d6f940a3991d0edb93490fdb31b55b1d46d223002bd294b1b72a666869b4d9d52661c680917c7a91bb5636f219f94ff8195f107bc03268a659bfab62f74f0b11d07e982ab5c2dee1b6b3b4078eaff5eb06fdc243da418beb939dea4777fb18c9d6e590edaebb605c823c3f29d28246b25e846fea8639229acd99a0d55ae0c43ba99a5a8193e27f2cc36a1b121b1a206e1d875bf8137cd0efbbbed944033c9b676044121c5f2f02a3c8243756d3ceb59b64bfe37ea7f81e7f0228aa3395c70614de841f384335896406b9cc02b488b749ad768a57deee00a3ddc976d7f354f0f8f934de99eb361ed13bd41dabaa2c89e14685690f707728c7193ed24e0466458099a3d7c679e73f8cade18021b7d02728cbff2efb9374117cc1c8bd6a4742a3716156f8852a815c02b633b84ad60f2626709bc2358e136f5fca452242695c5e2ae7589e94330c8d7e60887cda28e824c4233d90bf2679861a59f91c6816b39026bc1cf0e4f06b0936e80bfa10a43aaec4ba680e93901e9417b741007d77c507277d1c2fac2b9ddba2986a8e1611e0bcc6d37d9da8accaebdd462112f60bedc83934d3750906de14f03a024e0462ec11e1a1f697b9e5d8be80ba6474780054815a8a1f9574d4f6065fbbbd97c82a53ce70a9b25cdba87aef20e311d58d16685ed672bfba7dc7dec0a8dafc597f893e0054728b7ba0cc28d85e3dbf69a998a0ab83117795efadd12ab685af084013a37d6db5ac1c2470dc203c2955cea65ff7db0b1fea006e719c3b4470c86a727118aa36515e7d65d6b34da061e651cb048226174b6915ab7b4a710a62b10c6b99c9b6efe56da78aa382044c60d4c5076e42c0fabe63e12add35551a6468d44d1e71d1d6f8df1d1cb7841dc0614e7364c47d10d52581e9a00f0bb04f6eed331a77c7bd21878d97efde9344356144cd85661df28d446ca7536b8aaba190fa29a0a501d8ce37f6174f4a91caa78d2449c5ff7bb6e7c732e34675453540bdfa8d47fa4606dfdff9091caef790d4f95c92f1a8ee8f780b0434f0bd27a7b38aff23f1a837d67c5eceb8cef998cd7c66b4405cbc24a5619984a7dacfcecca08375163c784d3c0f42f4f63de7cb502dde30e39e0819b75bf1d5e55f59fa4127f6f658822e16418981aa42de5d7140180de79f5ec76210a36a30f7689cf58489757f91fbf78d646d9db4798623a4118a4935ff11d2df495093bd342071e20eb12de1f57cd8956b8cfaed5f759feeb117e221d31b90c1e3322df164479e1487d3f319994973eba48171e7b678b37e6b7b94902f9d76d6f2a4792621cafc6c12a4bede1ef66e8ae215cbd52ccdccf2a5049aad633f53352894eb28db08bb53c8b2b38834edffae407050d5c574640a5dec82be77050c026e83fb0fa635b98a99293f8872a4d265b563f5a8ace0baa805edd49cf62fde70700b4fd3d7beac0d88087eb4b8a349cd064757313e8db38e4f8604f7ed1691f9a8c62ed769ca33ee2b0bea76f80df2d68a610e4db08dda481b2438cc846eea8decb4493b2709bc1e1a1a156667289dc8b7832fe5d0c4917454c249de292a9ba31076e432a426574e5a973a527512b44f4cfffdafe1a4fd921f3807fb885473b3a08a76fa5bd011da3322df4d9445343af73591ab563bfbecb4e8ba44e49dcc9a02f0ea869332c22589cd2ca1fbc9672dc5d71221b0c54d01b8737984e58c392e85a079acff0902220c096d6ffa81b1250c21740844938dd813290127ecf96b0f8465f13975d47f1459cbdab5d8eeccca23f61093ff85c9fec0fa6d0c0dd9c1c4f3f9cf9cfb176b654a95e7fe3d9b31b63fa7016623225077b5162cc779b81fffb4cd793b77b4d3e8cf0c81923fe85d97d888bf38f317c2c4c224687c67a1fc814f9565423d6eb581fba5245cbd2ca5c1094b82010921a28a9a80ce56c3234d43295007d6c09f925e14d7375f1ba177d7b2526ada6f8bf2a77b39c71ef07d2c6caa3dd4e20f3b9f3eba152e5f7db76bb43d2235b9d8b94251f3400a7eab5ba745de62658814f331807529674c40dc2b31079fa5630db7d6d4afd2032bb2cda8b07d5894464122a85cb3e5556e00be22a4ba7f8dd8219ef8b439ee2b418b8b4394573a12d950e3a714ac07429b7160e40f91f54da8b12953ea8fee5c09534fc4be6f9d1c325efcf1dca37ed98c027c63a3d9becefb6ac809106ae5424b3e91d1594b2acfdd6fde761829699e61b579675f7004a33eafdcbe30d551cbf8974ceacc1bd497666dada15bee01acda213a06b1e5443e1223f716ba6ed0421a8c9c9c15cc591f5abfb62f2a92193486f90df1538a81814664732de1e519cf2575ac9a1f9de12ad3a5a3791db365afc02be354b7cdb98b8570e983ba63f3e1b2ce68445768865d5dc395d75c6b08a771a748235ec80d48354ca5678542be089076db7f3ca7ecd2498a6405306ce924783e671df4b07a0876eb3eb4c794bae1ddc37471c32e3179e9a933792bd7183cc086bfc53bcae8e569154bcf5cfc664c27393efbe7ff7b7ce1db744edcb8bb9058d3ba7c8a9581becdf8abfda94f1c03bf183baae944526ace046dea151ad8543dccefb6de7ac0331471fcb689422b908a5a2089ebc5623e19132ff018fcaf07a3e763160ec22b6796eb37ac61565c0ebab3e2fef9abb4e139298e5d615056cf80b6bd52dcbdcec0427c102de440bfe1ae3f190da52103bcf9fa375bfdee66ab0e0dd34473a85d191deb67683c421be217612864a34c33fcc9f3256b7f60874f9fdf732a4da3eb87667e651f72dc395e6b94f48b4daecfe408d5df047c5d7a1e2331eeb2328e12c741d57c0c816a330715f66bd3c732855d18b18a7d6fddc31a5f952e29afe564eb52a2eb856c6ce197e71c2e04a49e2f71fa5c46cb458663b38c03646f0286a5df8998b149feafbbe742257b6bf9e32ac8fff0a008b08fa58b037d3adf6568d12b8c6dfd2224044619dfc910840e188c9983f71810639185c602eb3f301ae0130bf043661a800659b95af2ac2186abdf5ec692dc134fe02fe810361786d8b77aaf4c02329fc74693a20d1187179e068dac2f20f229564dde219727a6787daac5426cd5b968314eb95e425af89f5f473fc387cb8cc3573eeff6035167d94ae88a451fc10ae0da50a3a2dc3b7c89f7a6c246471cad90b28c11c05878854816ce3016487c03c1e9962ca094d0cc0e5013b8e66ce54e99bfe619f333f84b22a181be0acd023545e062bf75e8c7d986923642c1aee77a48f17514523f30408cccb1e664bea0c3cb0e038ef32a6783a017ef58ee6aee9ee2b5e8d33426aa43701b74eca0b33ea4689c6b71834f78effd0e97e2bbd4c0e728fa3c4006a09f8e4b4ef6fef6aecec7750ccaddacff40e62630965cf4e6649142d33c97b18c146e37b6086aad56728f86636be3ef004ce100ca2b2248b4b9ed48ba9f9bd06efcc766915f39a11d2bd77c6b82de697bb8b1913de0e9de559bc6d265e0555d46a67106628aafd6afbe77ee1ab44ca9aae6506185fec9c46fae1e6b30311f2358998e5846c56605c2574992d1716dbf0071852b691a8b2a117fd800af4f413bad67143fb6ad2dd6d1d44e8bdcdac930545c5def6fd57d87fdf26db4a668b25e555bf2272a7dbda9401307ed252bd47fe733bc8d3b9c96ef3a9ea440288822b125181ab52f29b69ac3e6fa1f4ce9efe92b927e0ba2a0d104513dbb13455f85d0187da19ee27382355ec0455495dbd42822cea333e97d68f952f5990cfb707d69b064b0e9add575e68d98ad90f18e23dad7087f681ae0d0699df67a401608f7e76c3b2b47699c56afb6b1dc114d00b97b997f81d57e1ef9bc99363b3a0ef148e054bbe8cc7250ebd921bcb646d9be9aaf50f3c7f8b142e975688cd2c7ce499c5ce0c16c2918ffae15c7a14ee6b2c3d32c35dfb02d5fd4729525b581a0e0af9205e7a6ea03d62e5df7ffcae8094e69ad8496a5077387f671b5a25e97a5c9cbd0cd82bc35a7d7f91b9d4907d24705490a8e99d1e5e9cdedc305c5eea4b97936eb2cf76d7bd25c6cb2df6b3d5f8dd65528b682f1276bc8e80f22801280b90666dc23e177b4208c60aa9e0686839c7604d56e98f10433d42434301cd80836c9a92e1359625a6fe5d0e2279916c0a8108963a7d13304c7d805c4e0d42b7b6378c5c34a841a789bdc068083a8425f17ab878b465f5b383ade4c572b6f9ddad64e8d065a1a28cbd0cc7d14a88b60ac4705eb9d48213ae21962cf45d23eb3fe8982706f26c4bf2a7d001bef3fe8f8123532b1389da8c1c236543b4862cfb4ea08864e944129fc45428c987590c1fd32ec22be190ebd983827e3bf0db393c59d4deaa4c6f42a08ab69fe36cc21741a4cb15a15747ab3d21dbaa5a1be8a4c68730378256d6328272a2caf34f2865d0f80752ae7f5eb9e7d98e5ede796c35f433d0edc1890d61d9631dd19f5bfe1f7ce9d5d93cf96317f3f6623f60ae8a891733b290528632aca8a192eb092cd754423c62d629e28154715ef960b7bbf1cc53d56e930323b89c0ece933f08ea087c6ce4ac74c67afefdc03251a3bae0bd2c16456a4763057a4c400f91aad6181b5ebb5f26fb223b62928bd5bb54e3576679d256da7b782554eacd1238fefd8b6d26bec43f018a64a462e4427455ed1858c366239283d2a98a5d8d4082cd2abeafe14acc5370940c92dc1abd2c46085550fc7fc3840dd6b9e6ecaa664ab78cf992e6f4a0b760b845317e7f2005dabe7ac35ad46e11bfbf672543c20fb36ba54b7852c9b4e26c64b52a242d954890021ca173cdeb06125bdecdd9288806f144adf968e474d8c788a9d277c2409b8d38aab613f8e746728649c19eeb5e63e1d11a832b064bb41730fb7fcfcaf74e61b74989364e9dc3f634eca2083c3e84b02bd5a2b5a24ca2c3f59e8bd7be757b11b00b120994787502e298b90669123b17be64c11584500cca94c9ff096c833ce3fe2929e8ef3ecbb18e0360f8b832d4085315c0f7d5ecd7d301b2a2682b098fc95b3b88afee64fbbb6dcf0cf60a7df044bdf552ece957ae4b0c970f800110ee7782ad75a9cef8214c50f9ae4568c7b9f42752de16f73443d2c7bb3bfa8acbfc77bbda1d7e16ed38ee67bab18d6117001799a26942ec07b14cc34941b16ff57507202b7873a16a4d5745a8d7c9f881be12176b28b156ecbd31f3ecca975cbb0642f21fd735b2b9437303f7ec82f278e08efa0ac1f7b8c40ce7c9cdf50eb0b708cdfdb9bf59a23673466e173df2426db231b0efbf5a3e55e0726593a699e1ca8d5339881b96e9833a645d0300653acc570a7dae1a8ef37a41b20c45a0bcfcdb419bc648fdd85946f05f50c77697aaff7e4610d57d7c254214e5941f67e247b1939bc454d214dd447feb06ca5eb126be4898a353b7f5948ae9b2365cbcdd285c11bb257b116922539f115076d35f8fa2bbc48fae0c20f8e5e35377b38c2a2b241cad4b9dcca06dd1afcc081ca6091cc3baf9f31900cc3255eec3430c1da5cfe56ced2ff275df767e8b93e65d96df01e2b2afc5d00cb33004ead153d884e27724d7c66778579884daea93fbeac9650da762833c8506cbd67a1a0bc845666ba2f8539ef9bd559655ca73bc5eff11b70e7422ae09761c890e8492e7fb884b5b979afdc45e62537d4544683c51336ccf21e8bbd20122f0f00bb24ab31e2f7ac2a5d6598fb523c2137649ecd80bdde49c0b60bd22b64963f4241d5e315ad087418ef951358f9a1bbc09f94859c246179410dc71cf71670a84617008758982920d26a1d00893c56d4c7e199dcc4aef6325ef5373d02ff690a5c93f1e33db4f703fd2bc96b9edb986fb6fc4a76166e8ac446cff3c6fb30c95a28d35b4b18eaa84d1029c8d16257bb8ef313e015c8250022813b02a2ad272df6f2724b9882af5dda7efe06a454d3b79dbab61413bdaf21dfdba31190f19458f5eccc8adb25f37e55430fa1f1e6d5a032da91f6871b679c2c772a30fed416300319e17174705a0a071bc738b42c971e9bde34bdbe880d34243ed45ad152f7723ba59f2765c291bdac97a283badf1d868a3a95f355eaafaa26d4b8655439a771b8ad78331b695f0dc9543142ebaec6593063a9753bc4888d2d9af412b12153ef44a11ea6bbdfd68eff95eae2fab578d0df407abe4657889e7dcd97dac4da6be5460c6cfcbaa11fbac6ff130ff4a191ddef9ecb99e7efb51d72b2f5102a78f6b25bc4d74aa4b70cecaf3f5f08af0b4952162e70d20bb7bdd6bbb8f5b353079dd715d7a1af037b93f2d2a84356b5fa5f3ec01b2c6361a0f0e456d4a9ba4f9f3596c72c19ec4b8ff572c3911c6de64acd5e5ed207c94b5cef530f227fbf412276e26457397d2ab8dd42f82acef803fefb73286a029aafda4ac7fb2647f135112d63529b2de2d3fb115c5c968c50c149d770fa88544967236f280d870dcbb7832f8944f2dc35afd94115645659f254ef0e00d71554b3f80a5b7b7eb1975c23820f8eea19add7f5f4483e46a64ad05897478bc399e7a26cce16a2801e21a7030de488d09b6525ef284e35c9da3230d517178c1caaaa397c777f687b7d0be53a5837d11f3074aeaf94f82936624809692419b272fa585ce6c819862dbc077c00c67cf1992e2ff72aa4e1dea825d5f53c905d729ef6707d73b271c551c8e08058b5636a9a530d0fa11598f4e2829d14592a38a44cc3769002b919bab89385e36817132787322d53e136053c6439eb502199de05d577374e4650b8ffc3332d71a62b2bf2669ab69b1d5e372445f92deb4608c9cb1e09b0409f821df037ffa81d4255a2cc5dc7132f6e5aa2c56b1d29ffb28c236264d5e9645116766d8d8e8758c66b20121ab886c8245315629645ea4b89baa1ab6d1fd76b6002296c7d1a011c224f0a823063c14c64fe8bc23a23a1dc8620946fc2668eba109fd27509824087697c89cf3a95dec6a2dc8549bdacbff69301b26835c9a6b072382125c42a74fa2abd135e5391a0133bbd57191c179f023178965b3113ec754eb3435fac40ff9ad0a875a47f0af22b1f936c38c564d7d422ea92520966ecf4ff56330ba6d792c88d4fdd9368230e1a470ea5c8fa189c34eeb1692a56f704390b9f0cc0f559ec3f57bf70f3dc77263bc9d9428ba7078ae36b0669ec0d93fe183c0d428ef9efb47c8b7b9e90f737f5fcd095f5e182536c8e670fb4019f65915e8c5eadb1e7eadc6a22296f87b99d53131d2e596e985c878a56c2df487d1c5235a26e1a1089dd371f5db71df3479a01aa67725f85030a6bc266f9c0040b85ac2870d326994a48ef595fb6aad8629f9b3d9452b537cb63759577787d60e48f48d7d1fe5703fa5408e379a3909d81e2a19ba5bb7767cc0efacd927248d7f73a330de25160d8373dbea210150067f69739dc9d9de80c3adf71d5b1e735924e29436fa29efce7b5d04a122d59bcb2827d149c88f77f696defe0fbeca6014f8dc180f5e36195d38401949cfb6aa2025885ee2fdded7eb5e5cb4e28cfb5320fe94df49aee3b9f94538887e398ce70043f1aa29f2dd401241096040ea7c320eb546ec7f7b6e94fad750836d5a57a373b33cdb87294919b11ead33afe04002e45fff1ec9963d62d1ca2c6ce2eb582b445e334b77094da925f0ab6c97e2826823bfdf7dba02d85639685ab27ad1808c61ecc1eb41b82139892b67347a2e583180eae4b03ed540bc043c652bb3b00978b97186a586d2ae661ee49e5a0929d1a4efebc584e019ece28f481ce2b1c1c9cf4783ab887980b6e149afbd91945c2a484c3cd84524a7b6f12f18f7a66db523ab76f272df0e64b27e7b99475c6dd14dfc2f17c292d87d4a91d4493e2e90bb8000454e02ed5bbb23b7ab1ea2404c51591c6d41644fa3de2204c2af5e5651ed14559b11adc78142d5a7364f82b5ca9ce2b21796a2c0fa2f561e0a8fca35f915d8456880e63890f065cb149c6113c25860fa58d323806c412a051906ad61292be75f40abc252db673a661d5242caa39341f6fc2d8e14cf37ed7698b4fbf3355f9c7b77a73f2f4ab352266e5e9f23a8fbdcc0965835d7c41792fc4807c93de6acb550bd2ac025e201bad79589f4ddd12fedfe008b46ba0fbdb44f7eacc8104fd49bb0e9698be03b573fd542bffed919116dda100fee7e0f86c32075ee3eb3279fc6d7ce66369c2e69c30a7dd540410dd54cf9b9bfe7004c1e5a32be20e9d583f81a47d43d31dc4d2424b11ea538daf7b7d01d7fb8f143bb70d1313b2efa9c614db15f9bc6b4f2097daca2d860a67ba170606d7a8db5e4b1bb22a422934433e89038adea3f77ec8979a75cb4e98dd9f4c375fd4e44a8f586d709b2f364b5bae38902912fd132168e3b19055375bb9ffe247f084dd57b1bf1bf1123bb55dab104208a523aedd7b807ac87ffb7a2253cdda1819b20be93ae9aa9585d0dced20c7e00af5073d323cd011d21440af53b791e36af99a0ac3999bc2f649ca1c1f6d7c9295b225c43d6bdb35d56ea402a095ff2c23cbf70b8e745e303ad694d9d7279aa99adcfb6e1eb303620b05c4bed22b8d18fc147b2b31665617f15c736d3010401175df67b30656dd2ea8469174c7ae2ff55ad0a23a9c221e63a16b4093b87ea9cc18727a12b416ac472521ae0e8c08ef89b85fd9c740bd999c07ecbcbd0170430d52bd75ffd5cb4497439ae4d79efb205269c57b5acc25059c41b7b95e3181e8584c3cb4b5121f4a0ba8eb4c195b4f21c3ca56fd28410d5f4a03fdbb4b1cc1d8d027a1a29eb9d0c5ed76657734e0b955de6e291f8ddbec1d76dba828f81d82e42b5f6fa2c16f7249ef0647ce96ed2a464df0af823a763800e2b124a5ab86664a50585e04562ff04f0f69571eee49c9a7b1b20474fea5895f5a0c3ffaf3c1d4ebf9f3da466afe82209453a1bc7dcb12b65776a3427fcb9bf47d92cf854051b195586e07e6282d908672c46bb513bb0d223ef056e81b1fa751b9729f305df5ccac78b168663bf89fd79261f6963f804a10bfaab97378fa940e18792d8091fabf82ebf635463c3003a435cdaeca10c1114e97dded59746fd98c293a6e7cf274f63aa1f7e6094f7791f848e853a20dece0fd6659243843c94ed6581ebb9e3bc32163fcd9c313687862a439153183c5b3d7d8ded7fe4a7dfc05eb7717b88eab771e4359684ccd160ca384b8eca7f7c0d5bcce1c8b3353ed50c7dfba8b367e1af29b63d77603ac955cde1cb173075b006486489240dc3c5b07ee0b4122a50d7c9a590caf56d5b35179260328da07b91d478faf0413a5e62fa5e72db619237eaa9e93f3c14c7de074bc9cacc792d37fd9f8e39400520811aac1c9537dbb8f87d48137a0b8f0161a2587fbdc272817a1d1f3f4f8cf44a974f4b056cf1269f5cf6e671af3aa9ca628912bfdf7191d3deb53bc87d87eff716078a3871a9692411bfa210222c47644a160cb4d073570cbe244a1a3ec95719920a57196f599b328e65b8b96ad16d9d336ec5a7695fc79ccca2a44b2aa1c5cb28a532611ffac26d2ee8536f6e42a9c4cfe1f49419c2e12fb8f2ca69871ac1fe3a79a3b1240c570a6052842be141b593fe9660c9ad288a5d750d969135f2d2d742ceea3bb2920ae2e5378c23c566f33e37bf62bcddc82a699d9ed36f0387ad976638f3e979ddfd102ffd6a02cbb0e73b56655a2eed733fde8ba6cd5e5e0e370cfb857adbc7f5eeb377f053f4233ec5e565e409b10d8bdd5d97ed09d28e852bd6514c0aee755e867230b63a5deedecaa8b147277d1eb22b426739b811e72694dde26f32c1f7a8ae9a37e3c0452e04686e69a8d082afadf014754d7074440131a5f60c0081d077ad4a028d8104d1c9dfdd8d518444929568f4a6866a59c5658d04c4c3081688e0e29fa5ec4e9c69da151a3efbb57cb47cc5af0e2af96858dc118f6c16df9d66bd79c8fee0423e139689228321e2c345b281812b3f20940256e3f9183b2b4e3f3f144431313facd1038f040dda45147f43f5132f406509a1b2e6e7d6078fb1745f43a3545500c7949a0c7a68c6f32c24f8a86c8c3d5936f484642c7a2b71d82a862697b02ac0838bc57e71d651435ca6ef2654738e38b87d473c99bb2662fa751fa62e256182aa9d83f2870b78ee6b20f2ff0204152f354e2009291bab95aa487054633d0112e74dfbee72e53e290d9e60c5e687c761f9852334e97915b565ca7b56e891bd50ea8fc31293484e8bce445309276711bcd091d614672cd856f145c924b5fb9cf819946f2fef8de772d7982ac4b154d1b4cc1459d13b21b92", 0x2000, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)={0x90, 0x0, 0x5, {0x5, 0x1, 0xc, 0x1, 0x7, 0x7, {0x3, 0x4, 0x8, 0x49, 0x480f6ecb, 0x8000000000000001, 0x80000000, 0x9, 0x6, 0x6000, 0x800, r8, r9, 0x3, 0x3}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r6, r9) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r10 = dup2(r1, r0) accept$inet(r10, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x8901, &(0x7f0000000400)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = openat$tcp_congestion(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r13, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000090}, 0x80) fcntl$setown(r12, 0x8, 0x0) sendmsg$NLBL_MGMT_C_ADD(r11, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14, 0x0, 0x800, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x440c0}, 0x4000) 16.173300117s ago: executing program 2 (id=15593): readv(0xffffffffffffffff, 0x0, 0x0) 15.153061528s ago: executing program 2 (id=15594): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r1, &(0x7f0000000340)={0x2, 0x0, @remote, 0x4}, 0x10) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000380)={{r0}, "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"}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) 10.572734313s ago: executing program 2 (id=15604): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) setsockopt$sock_int(r2, 0x1, 0x27, &(0x7f0000000040)=0x7, 0x4) connect$l2tp(r1, &(0x7f0000000340)={0x2, 0x0, @remote, 0x4}, 0x10) socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) sendmsg$NL80211_CMD_UPDATE_FT_IES(r2, 0x0, 0x80) 8.582646413s ago: executing program 3 (id=15609): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r1, &(0x7f0000000340)={0x2, 0x0, @remote, 0x4}, 0x10) ioctl$SNDCTL_SEQ_NRMIDIS(r2, 0x8004510b, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x101442, 0x0) r4 = dup(r3) ioctl$BLKFRAGET(r4, 0x1265, &(0x7f0000000040)) openat$binderfs(0xffffffffffffff9c, 0x0, 0x1bc47347c88e6861, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0186416, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x3, 0x3, 0x1}) r5 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0xa041, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x40040, 0x0) r8 = dup3(r6, r7, 0x0) ioctl$sock_SIOCDELRT(r8, 0x5452, &(0x7f0000000240)={0x2, @vsock={0x28, 0x0, 0x0, @local}, @ethernet={0x306, @remote}, @nfc={0x27, 0x0, 0x1, 0x6}, 0xfffc, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2f0000}) ioctl$BTRFS_IOC_SET_FEATURES(r5, 0x5450, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x51}}, 0x80) 5.893196942s ago: executing program 2 (id=15610): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='dummy0\x00', 0x10) connect$l2tp(r1, &(0x7f0000000340)={0x2, 0x0, @remote, 0x4}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 5.412679392s ago: executing program 3 (id=15611): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x198, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x91, 0x5, "96607d6d16672fbd74c10eb7f3690c174a7cbefeecfef66e6d28d8bf9dcca67ba6d3f43bdbcd8c3e0aee3454ea5ce69de3f98020c3b2fab4807ad951e71d4ee5e4d015a79f1e779ec1c3bb9474a6658f2002a9080c1dbbfe03bf32df6a2fb1e5ac06740ef02313b8b16e460ee4db3116ee36ab32131647c4a06f5abf63c7077dfa9d6b74589714b0cf9af63866"}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "a61f13b5addd95995a6f521252ea78927fd7bf3940ef2a0017452f661c5a2ff03d5ecefafa84134941366406b60d8caf59d375baef02def103425f3d22f10cdba0cbc605bb63c6412162c0b10b52842c7cc32cc3cea3579d13bf601a6c8d6764e0bf65fc8b1ea180d6ec6c49257b3e1940"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_DEBUG_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0x4}]}, 0x198}, 0x1, 0x0, 0x0, 0xc804}, 0x4008004) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, &(0x7f00000002c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000300)=0x2c) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x1410, 0x8, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x4}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x84) close_range(r0, r0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'tunl0\x00', 0x0, 0x7800, 0x10, 0x8001, 0x5, {{0x24, 0x4, 0x2, 0x9, 0x90, 0x64, 0x0, 0xb0, 0x2f, 0x0, @empty, @private=0xa010100, {[@noop, @generic={0x44, 0xd, "b97be54ea8426d761a3e99"}, @cipso={0x86, 0x1a, 0x1, [{0x2, 0x12, "f411c10addccc5fbffe5c9aba334422b"}, {0x5, 0x2}]}, @rr={0x7, 0xb, 0x75, [@empty, @multicast2]}, @timestamp_addr={0x44, 0x24, 0x71, 0x1, 0x3, [{@broadcast}, {@private=0xa010100, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1000}, {@multicast2, 0x6}]}, @rr={0x7, 0x1f, 0x6a, [@multicast2, @multicast1, @multicast2, @loopback, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xe7f}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}]}, @ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x80) recvmsg$can_j1939(r0, &(0x7f00000009c0)={&(0x7f00000006c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/233, 0xe9}, {&(0x7f0000000840)}, {&(0x7f0000000880)=""/114, 0x72}], 0x3, &(0x7f0000000940)=""/121, 0x79}, 0x2123) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x20, 0x140e, 0x100, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x8084}, 0x48041) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000d40)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x34, 0x0, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4000090) 5.312009756s ago: executing program 3 (id=15612): r0 = socket(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000780)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x2008000}, 0x4004000) 5.20263217s ago: executing program 3 (id=15613): r0 = openat$fb1(0xffffff9c, &(0x7f0000000000), 0x179000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x0) mount$tmpfs(0x0, &(0x7f00000006c0)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x0) r1 = socket$unix(0x1, 0x1, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0x5451, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom1\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000040)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r3) ioctl$sock_SIOCBRDELBR(r1, 0x5450, 0x0) r4 = landlock_create_ruleset(&(0x7f0000000040)={0x3001}, 0x10, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x220100, 0xc48e68563cbcbbbf) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r4, 0x1, &(0x7f0000000340)={0x1, r5}, 0x0) landlock_restrict_self(r4, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_void(r6, 0x1, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x3, 0x5) r7 = openat$audio1(0xffffff9c, &(0x7f00000000c0), 0x20002, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r7, 0x800c5012, &(0x7f0000000100)) 2.613111694s ago: executing program 3 (id=15614): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) setsockopt$sock_int(r2, 0x1, 0x27, &(0x7f0000000040)=0x7, 0x4) connect$l2tp(r1, &(0x7f0000000340)={0x2, 0x0, @remote, 0x4}, 0x10) socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) sendmsg$NL80211_CMD_UPDATE_FT_IES(r2, 0x0, 0x80) 0s ago: executing program 3 (id=15616): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x198, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x91, 0x5, "96607d6d16672fbd74c10eb7f3690c174a7cbefeecfef66e6d28d8bf9dcca67ba6d3f43bdbcd8c3e0aee3454ea5ce69de3f98020c3b2fab4807ad951e71d4ee5e4d015a79f1e779ec1c3bb9474a6658f2002a9080c1dbbfe03bf32df6a2fb1e5ac06740ef02313b8b16e460ee4db3116ee36ab32131647c4a06f5abf63c7077dfa9d6b74589714b0cf9af63866"}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "a61f13b5addd95995a6f521252ea78927fd7bf3940ef2a0017452f661c5a2ff03d5ecefafa84134941366406b60d8caf59d375baef02def103425f3d22f10cdba0cbc605bb63c6412162c0b10b52842c7cc32cc3cea3579d13bf601a6c8d6764e0bf65fc8b1ea180d6ec6c49257b3e1940"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_DEBUG_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0x4}]}, 0x198}, 0x1, 0x0, 0x0, 0xc804}, 0x4008004) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, &(0x7f00000002c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000300)=0x2c) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x1410, 0x8, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x4}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x84) close_range(r0, r0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'tunl0\x00', 0x0, 0x7800, 0x10, 0x8001, 0x5, {{0x24, 0x4, 0x2, 0x9, 0x90, 0x64, 0x0, 0xb0, 0x2f, 0x0, @empty, @private=0xa010100, {[@noop, @generic={0x44, 0xd, "b97be54ea8426d761a3e99"}, @cipso={0x86, 0x1a, 0x1, [{0x2, 0x12, "f411c10addccc5fbffe5c9aba334422b"}, {0x5, 0x2}]}, @rr={0x7, 0xb, 0x75, [@empty, @multicast2]}, @timestamp_addr={0x44, 0x24, 0x71, 0x1, 0x3, [{@broadcast}, {@private=0xa010100, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1000}, {@multicast2, 0x6}]}, @rr={0x7, 0x1f, 0x6a, [@multicast2, @multicast1, @multicast2, @loopback, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xe7f}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}]}, @ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x80) recvmsg$can_j1939(r0, &(0x7f00000009c0)={&(0x7f00000006c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/233, 0xe9}, {&(0x7f0000000840)}, {&(0x7f0000000880)=""/114, 0x72}], 0x3, &(0x7f0000000940)=""/121, 0x79}, 0x2123) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000d40)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x34, 0x0, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4000090) kernel console output (not intermixed with test programs): tclass=netlink_generic_socket permissive=1 [ 9518.183654][ T31] audit: type=1400 audit(9518.090:207423): avc: denied { prog_load } for pid=2826 comm="syz.3.15335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9518.200351][ T31] audit: type=1400 audit(9518.100:207424): avc: denied { bpf } for pid=2826 comm="syz.3.15335" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9524.277536][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 9524.278361][ T31] audit: type=1400 audit(9524.180:207451): avc: denied { create } for pid=2847 comm="syz.2.15339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9524.336758][ T31] audit: type=1400 audit(9524.240:207452): avc: denied { setopt } for pid=2847 comm="syz.2.15339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9524.421211][ T31] audit: type=1400 audit(9524.320:207453): avc: denied { create } for pid=2851 comm="syz.3.15341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9524.426447][ T31] audit: type=1400 audit(9524.330:207454): avc: denied { setopt } for pid=2851 comm="syz.3.15341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9524.428579][ T31] audit: type=1400 audit(9524.330:207455): avc: denied { connect } for pid=2851 comm="syz.3.15341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9524.542289][ T31] audit: type=1400 audit(9524.450:207456): avc: denied { connect } for pid=2847 comm="syz.2.15339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9524.941246][ T31] audit: type=1400 audit(9524.850:207457): avc: denied { ioctl } for pid=2851 comm="syz.3.15341" path="socket:[186459]" dev="sockfs" ino=186459 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9525.245555][ T31] audit: type=1400 audit(9525.150:207458): avc: denied { ioctl } for pid=2847 comm="syz.2.15339" path="socket:[186456]" dev="sockfs" ino=186456 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9525.444706][ T31] audit: type=1400 audit(9525.350:207459): avc: denied { ioctl } for pid=2851 comm="syz.3.15341" path="socket:[186459]" dev="sockfs" ino=186459 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9525.950799][ T31] audit: type=1400 audit(9525.860:207460): avc: denied { read } for pid=2851 comm="syz.3.15341" path="socket:[186459]" dev="sockfs" ino=186459 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9529.576719][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 9529.580081][ T31] audit: type=1400 audit(9529.480:207472): avc: denied { read } for pid=2864 comm="syz.3.15346" path="socket:[185566]" dev="sockfs" ino=185566 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9531.193354][ T31] audit: type=1400 audit(9531.100:207473): avc: denied { create } for pid=2872 comm="syz.3.15348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9531.225585][ T31] audit: type=1400 audit(9531.130:207474): avc: denied { write } for pid=2872 comm="syz.3.15348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9531.228576][ T31] audit: type=1400 audit(9531.130:207475): avc: denied { setopt } for pid=2872 comm="syz.3.15348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9531.239873][ T31] audit: type=1400 audit(9531.140:207476): avc: denied { connect } for pid=2872 comm="syz.3.15348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9531.746470][ T31] audit: type=1400 audit(9531.650:207478): avc: denied { ioctl } for pid=2872 comm="syz.3.15348" path="socket:[185571]" dev="sockfs" ino=185571 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9531.755989][ T31] audit: type=1400 audit(9531.480:207477): avc: denied { create } for pid=2871 comm="syz.2.15347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9532.262927][ T31] audit: type=1400 audit(9532.170:207479): avc: denied { ioctl } for pid=2872 comm="syz.3.15348" path="socket:[185571]" dev="sockfs" ino=185571 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9532.269015][ T31] audit: type=1400 audit(9532.170:207480): avc: denied { setopt } for pid=2871 comm="syz.2.15347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9532.360498][ T31] audit: type=1400 audit(9532.270:207481): avc: denied { connect } for pid=2871 comm="syz.2.15347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9535.008567][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 9535.008817][ T31] audit: type=1400 audit(9534.910:207493): avc: denied { ioctl } for pid=2883 comm="syz.3.15349" path="socket:[186488]" dev="sockfs" ino=186488 ioctlcmd=0x500e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9535.332288][ T31] audit: type=1400 audit(9535.240:207494): avc: denied { ioctl } for pid=2871 comm="syz.2.15347" path="socket:[186477]" dev="sockfs" ino=186477 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9535.513219][ T31] audit: type=1400 audit(9535.420:207495): avc: denied { ioctl } for pid=2883 comm="syz.3.15349" path="socket:[186488]" dev="sockfs" ino=186488 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9536.017247][ T31] audit: type=1400 audit(9535.920:207496): avc: denied { ioctl } for pid=2883 comm="syz.3.15349" path="socket:[186488]" dev="sockfs" ino=186488 ioctlcmd=0x5349 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9536.526782][ T31] audit: type=1400 audit(9536.430:207497): avc: denied { write } for pid=2883 comm="syz.3.15349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9537.042945][ T31] audit: type=1400 audit(9536.950:207498): avc: denied { write } for pid=2883 comm="syz.3.15349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9537.548443][ T31] audit: type=1400 audit(9537.450:207499): avc: denied { ioctl } for pid=2883 comm="syz.3.15349" path="socket:[186488]" dev="sockfs" ino=186488 ioctlcmd=0xf513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9537.831454][ T31] audit: type=1400 audit(9537.740:207500): avc: denied { create } for pid=2895 comm="syz.3.15352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9537.845496][ T31] audit: type=1400 audit(9537.750:207501): avc: denied { setopt } for pid=2895 comm="syz.3.15352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9537.857209][ T31] audit: type=1400 audit(9537.760:207502): avc: denied { connect } for pid=2895 comm="syz.3.15352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9540.975998][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 9540.978981][ T31] audit: type=1400 audit(9540.880:207509): avc: denied { create } for pid=2901 comm="syz.3.15354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9540.981162][ T31] audit: type=1400 audit(9540.890:207510): avc: denied { setopt } for pid=2901 comm="syz.3.15354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9540.991734][ T31] audit: type=1400 audit(9540.900:207511): avc: denied { connect } for pid=2901 comm="syz.3.15354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9541.491156][ T31] audit: type=1400 audit(9541.400:207512): avc: denied { create } for pid=2901 comm="syz.3.15354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9541.492531][ T31] audit: type=1400 audit(9541.400:207513): avc: denied { ioctl } for pid=2901 comm="syz.3.15354" path="socket:[185589]" dev="sockfs" ino=185589 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9541.501336][ T31] audit: type=1400 audit(9541.410:207514): avc: denied { ioctl } for pid=2901 comm="syz.3.15354" path="socket:[185590]" dev="sockfs" ino=185590 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9541.509015][ T31] audit: type=1400 audit(9541.410:207515): avc: denied { write } for pid=2901 comm="syz.3.15354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9542.013564][ T31] audit: type=1400 audit(9541.920:207516): avc: denied { ioctl } for pid=2901 comm="syz.3.15354" path="socket:[185586]" dev="sockfs" ino=185586 ioctlcmd=0x943a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9542.822764][ T31] audit: type=1400 audit(9542.730:207517): avc: denied { create } for pid=2903 comm="syz.2.15353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9544.029907][ T31] audit: type=1400 audit(9543.930:207518): avc: denied { create } for pid=2903 comm="syz.2.15353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9546.731416][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 9546.731728][ T31] audit: type=1400 audit(9546.640:207531): avc: denied { write } for pid=2909 comm="syz.3.15355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9547.491936][ T31] audit: type=1400 audit(9547.400:207532): avc: denied { create } for pid=2919 comm="syz.3.15357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9547.504268][ T31] audit: type=1400 audit(9547.410:207533): avc: denied { create } for pid=2919 comm="syz.3.15357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9547.507987][ T31] audit: type=1400 audit(9547.410:207534): avc: denied { write } for pid=2919 comm="syz.3.15357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9547.515101][ T31] audit: type=1400 audit(9547.420:207535): avc: denied { read } for pid=2919 comm="syz.3.15357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9547.678470][ T31] audit: type=1400 audit(9547.580:207536): avc: denied { create } for pid=2921 comm="syz.3.15358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9547.707434][ T31] audit: type=1400 audit(9547.610:207537): avc: denied { setopt } for pid=2921 comm="syz.3.15358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9547.712780][ T31] audit: type=1400 audit(9547.620:207538): avc: denied { connect } for pid=2921 comm="syz.3.15358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9548.224349][ T31] audit: type=1400 audit(9548.130:207539): avc: denied { ioctl } for pid=2921 comm="syz.3.15358" path="socket:[186535]" dev="sockfs" ino=186535 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9548.742362][ T31] audit: type=1400 audit(9548.650:207540): avc: denied { ioctl } for pid=2921 comm="syz.3.15358" path="socket:[186535]" dev="sockfs" ino=186535 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9551.360935][ T2932] vlan0: entered promiscuous mode [ 9551.890852][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 9551.894960][ T31] audit: type=1400 audit(9551.790:207548): avc: denied { write } for pid=2928 comm="syz.3.15360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9552.391872][ T31] audit: type=1400 audit(9552.300:207549): avc: denied { ioctl } for pid=2928 comm="syz.3.15360" path="socket:[185612]" dev="sockfs" ino=185612 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9552.641661][ T31] audit: type=1400 audit(9552.550:207550): avc: denied { create } for pid=2927 comm="syz.2.15359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9552.725473][ T31] audit: type=1400 audit(9552.630:207551): avc: denied { setopt } for pid=2927 comm="syz.2.15359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9552.728209][ T31] audit: type=1400 audit(9552.630:207552): avc: denied { connect } for pid=2927 comm="syz.2.15359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9552.901597][ T31] audit: type=1400 audit(9552.810:207553): avc: denied { write } for pid=2928 comm="syz.3.15360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9553.404075][ T31] audit: type=1400 audit(9553.310:207554): avc: denied { ioctl } for pid=2928 comm="syz.3.15360" path="socket:[185612]" dev="sockfs" ino=185612 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9553.663509][ T31] audit: type=1400 audit(9553.570:207555): avc: denied { create } for pid=2927 comm="syz.2.15359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9553.773567][ T31] audit: type=1400 audit(9553.680:207556): avc: denied { ioctl } for pid=2927 comm="syz.2.15359" path="socket:[186546]" dev="sockfs" ino=186546 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9553.800999][ T31] audit: type=1400 audit(9553.710:207557): avc: denied { create } for pid=2927 comm="syz.2.15359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9558.057348][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 9558.057499][ T31] audit: type=1400 audit(9557.960:207577): avc: denied { create } for pid=2961 comm="syz.3.15365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9558.066706][ T31] audit: type=1400 audit(9557.970:207578): avc: denied { setopt } for pid=2961 comm="syz.3.15365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9558.084188][ T31] audit: type=1400 audit(9557.990:207579): avc: denied { connect } for pid=2961 comm="syz.3.15365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9558.383779][ T31] audit: type=1400 audit(9558.290:207580): avc: denied { create } for pid=2960 comm="syz.2.15364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9558.592432][ T31] audit: type=1400 audit(9558.500:207581): avc: denied { create } for pid=2961 comm="syz.3.15365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9558.595304][ T31] audit: type=1400 audit(9558.500:207582): avc: denied { ioctl } for pid=2961 comm="syz.3.15365" path="socket:[185636]" dev="sockfs" ino=185636 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9558.613379][ T31] audit: type=1400 audit(9558.520:207583): avc: denied { ioctl } for pid=2961 comm="syz.3.15365" path="socket:[186566]" dev="sockfs" ino=186566 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9559.124413][ T31] audit: type=1400 audit(9559.030:207584): avc: denied { write } for pid=2961 comm="syz.3.15365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9559.271580][ T31] audit: type=1400 audit(9559.180:207585): avc: denied { setopt } for pid=2960 comm="syz.2.15364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9559.387962][ T31] audit: type=1400 audit(9559.290:207586): avc: denied { connect } for pid=2960 comm="syz.2.15364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9563.114848][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 9563.115030][ T31] audit: type=1400 audit(9563.020:207611): avc: denied { ioctl } for pid=2983 comm="syz.3.15368" path="socket:[186594]" dev="sockfs" ino=186594 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9564.752683][ T31] audit: type=1400 audit(9564.660:207612): avc: denied { create } for pid=2988 comm="syz.3.15370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9564.762384][ T31] audit: type=1400 audit(9564.670:207613): avc: denied { setopt } for pid=2988 comm="syz.3.15370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9564.775671][ T31] audit: type=1400 audit(9564.680:207614): avc: denied { connect } for pid=2988 comm="syz.3.15370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9565.282585][ T31] audit: type=1400 audit(9565.190:207615): avc: denied { create } for pid=2988 comm="syz.3.15370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9565.292433][ T31] audit: type=1400 audit(9565.200:207616): avc: denied { ioctl } for pid=2988 comm="syz.3.15370" path="socket:[185645]" dev="sockfs" ino=185645 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9565.303857][ T31] audit: type=1400 audit(9565.200:207617): avc: denied { ioctl } for pid=2988 comm="syz.3.15370" path="socket:[185642]" dev="sockfs" ino=185642 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9565.813833][ T31] audit: type=1400 audit(9565.720:207618): avc: denied { write } for pid=2988 comm="syz.3.15370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9566.319957][ T31] audit: type=1400 audit(9566.220:207619): avc: denied { write } for pid=2988 comm="syz.3.15370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9567.101353][ T31] audit: type=1400 audit(9567.010:207620): avc: denied { create } for pid=2987 comm="syz.2.15369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9567.974539][ T2995] FAULT_INJECTION: forcing a failure. [ 9567.974539][ T2995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 9567.980034][ T2995] CPU: 0 UID: 0 PID: 2995 Comm: syz.3.15371 Not tainted syzkaller #0 PREEMPT [ 9567.980122][ T2995] Hardware name: ARM-Versatile Express [ 9567.980140][ T2995] Call trace: [ 9567.980187][ T2995] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 9567.980257][ T2995] r7:e0231e20 r6:00000000 r5:60000013 r4:82260b30 [ 9567.980277][ T2995] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 9567.980326][ T2995] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 9567.980376][ T2995] r5:85f24800 r4:8294f190 [ 9567.980394][ T2995] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 9567.980452][ T2995] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 9567.980484][ T2995] r8:00004000 r7:e0231e20 r6:20000c80 r5:00000000 r4:e0231f20 [ 9567.980492][ T2995] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 9567.980517][ T2995] [<80972e40>] (should_fail_usercopy) from [<81546d94>] (copy_msghdr_from_user+0x50/0x130) [ 9567.980544][ T2995] [<81546d44>] (copy_msghdr_from_user) from [<81546eec>] (___sys_sendmsg+0x78/0xd0) [ 9567.980570][ T2995] r8:00004000 r7:00000000 r6:85153b80 r5:e0231f20 r4:e0231e64 [ 9567.980578][ T2995] [<81546e74>] (___sys_sendmsg) from [<815473a8>] (__sys_sendmsg+0x8c/0xe0) [ 9567.980605][ T2995] r10:00000128 r9:85f24800 r8:83b2ec00 r7:00004000 r6:20000c80 r5:83b2ec01 [ 9567.980615][ T2995] r4:00000004 [ 9567.980629][ T2995] [<8154731c>] (__sys_sendmsg) from [<81547410>] (sys_sendmsg+0x14/0x18) [ 9567.980655][ T2995] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 9567.980663][ T2995] [<815473fc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9567.980689][ T2995] Exception stack(0xe0231fa8 to 0xe0231ff0) [ 9567.980729][ T2995] 1fa0: 00000000 00000000 00000004 20000c80 00004000 00000000 [ 9567.980756][ T2995] 1fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f020bc [ 9567.980768][ T2995] 1fe0: 76f01ec0 76f01eb0 0001948c 001322a0 [ 9568.183981][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 9568.186579][ T31] audit: type=1400 audit(9568.090:207627): avc: denied { create } for pid=2997 comm="syz.3.15372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9568.190053][ T31] audit: type=1400 audit(9568.090:207628): avc: denied { write } for pid=2997 comm="syz.3.15372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9568.193366][ T31] audit: type=1400 audit(9568.100:207629): avc: denied { read } for pid=2997 comm="syz.3.15372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9568.292710][ T31] audit: type=1400 audit(9568.200:207630): avc: denied { create } for pid=2999 comm="syz.3.15373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9568.311278][ T31] audit: type=1400 audit(9568.220:207631): avc: denied { setopt } for pid=2999 comm="syz.3.15373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9568.312682][ T31] audit: type=1400 audit(9568.220:207632): avc: denied { connect } for pid=2999 comm="syz.3.15373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9568.822470][ T31] audit: type=1400 audit(9568.730:207633): avc: denied { ioctl } for pid=2999 comm="syz.3.15373" path="socket:[185660]" dev="sockfs" ino=185660 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9568.902839][ T31] audit: type=1400 audit(9568.810:207634): avc: denied { ioctl } for pid=2987 comm="syz.2.15369" path="socket:[186607]" dev="sockfs" ino=186607 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9569.343155][ T31] audit: type=1400 audit(9569.250:207635): avc: denied { write } for pid=2999 comm="syz.3.15373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9570.152478][ T31] audit: type=1400 audit(9570.060:207636): avc: denied { ioctl } for pid=2987 comm="syz.2.15369" path="socket:[186607]" dev="sockfs" ino=186607 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9573.971375][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 9573.973697][ T31] audit: type=1400 audit(9573.880:207643): avc: denied { create } for pid=3009 comm="syz.2.15375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9574.037459][ T31] audit: type=1400 audit(9573.940:207644): avc: denied { setopt } for pid=3009 comm="syz.2.15375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9574.054400][ T31] audit: type=1400 audit(9573.960:207645): avc: denied { create } for pid=3012 comm="syz.3.15376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9574.070794][ T31] audit: type=1400 audit(9573.980:207646): avc: denied { getopt } for pid=3012 comm="syz.3.15376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9574.072515][ T31] audit: type=1400 audit(9573.980:207647): avc: denied { ioctl } for pid=3012 comm="syz.3.15376" path="socket:[185678]" dev="sockfs" ino=185678 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9574.077295][ T31] audit: type=1400 audit(9573.980:207648): avc: denied { write } for pid=3012 comm="syz.3.15376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9574.093518][ T31] audit: type=1400 audit(9574.000:207649): avc: denied { read } for pid=3012 comm="syz.3.15376" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9574.095397][ T31] audit: type=1400 audit(9574.000:207650): avc: denied { open } for pid=3012 comm="syz.3.15376" path="net:[4026532800]" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9574.114293][ T31] audit: type=1400 audit(9574.020:207651): avc: denied { read } for pid=3012 comm="syz.3.15376" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9574.116260][ T31] audit: type=1400 audit(9574.020:207652): avc: denied { open } for pid=3012 comm="syz.3.15376" path="net:[4026532800]" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9575.732622][ T3023] vlan0: entered promiscuous mode [ 9579.464569][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 9579.464893][ T31] audit: type=1400 audit(9579.370:207697): avc: denied { read } for pid=3030 comm="syz.3.15380" path="socket:[185722]" dev="sockfs" ino=185722 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9579.465143][ T31] audit: type=1400 audit(9579.370:207698): avc: denied { read } for pid=3030 comm="syz.3.15380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9581.050874][ T31] audit: type=1400 audit(9580.960:207699): avc: denied { create } for pid=3035 comm="syz.2.15381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9581.138319][ T31] audit: type=1400 audit(9581.040:207700): avc: denied { create } for pid=3037 comm="syz.3.15382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9581.139438][ T31] audit: type=1400 audit(9581.040:207701): avc: denied { write } for pid=3037 comm="syz.3.15382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9581.158093][ T31] audit: type=1400 audit(9581.060:207702): avc: denied { read } for pid=3037 comm="syz.3.15382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9581.321973][ T31] audit: type=1400 audit(9581.230:207703): avc: denied { create } for pid=3039 comm="syz.3.15383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9581.327509][ T31] audit: type=1400 audit(9581.230:207704): avc: denied { setopt } for pid=3039 comm="syz.3.15383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9581.333480][ T31] audit: type=1400 audit(9581.240:207705): avc: denied { connect } for pid=3039 comm="syz.3.15383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9581.844863][ T31] audit: type=1400 audit(9581.750:207706): avc: denied { ioctl } for pid=3039 comm="syz.3.15383" path="socket:[186637]" dev="sockfs" ino=186637 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9584.528231][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 9584.529940][ T31] audit: type=1400 audit(9584.430:207720): avc: denied { create } for pid=3047 comm="syz.3.15385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9584.532637][ T31] audit: type=1400 audit(9584.440:207721): avc: denied { ioctl } for pid=3047 comm="syz.3.15385" path="socket:[185757]" dev="sockfs" ino=185757 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9584.536185][ T31] audit: type=1400 audit(9584.440:207722): avc: denied { ioctl } for pid=3047 comm="syz.3.15385" path="socket:[185754]" dev="sockfs" ino=185754 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9585.052601][ T31] audit: type=1400 audit(9584.960:207723): avc: denied { write } for pid=3047 comm="syz.3.15385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9586.674852][ T31] audit: type=1400 audit(9586.580:207724): avc: denied { create } for pid=3052 comm="syz.3.15387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9586.701125][ T31] audit: type=1400 audit(9586.610:207725): avc: denied { setopt } for pid=3052 comm="syz.3.15387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9586.703879][ T31] audit: type=1400 audit(9586.610:207726): avc: denied { connect } for pid=3052 comm="syz.3.15387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9586.716213][ T31] audit: type=1400 audit(9586.620:207727): avc: denied { ioctl } for pid=3052 comm="syz.3.15387" path="socket:[185762]" dev="sockfs" ino=185762 ioctlcmd=0x510b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9586.719045][ T31] audit: type=1400 audit(9586.620:207728): avc: denied { ioctl } for pid=3052 comm="syz.3.15387" path="socket:[185762]" dev="sockfs" ino=185762 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9586.736702][ T31] audit: type=1400 audit(9586.640:207729): avc: denied { write } for pid=3052 comm="syz.3.15387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9589.951864][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 9589.952232][ T31] audit: type=1400 audit(9589.860:207750): avc: denied { write } for pid=3067 comm="syz.3.15391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9590.001964][ T31] audit: type=1400 audit(9589.910:207751): avc: denied { read } for pid=3051 comm="syz.2.15386" path="socket:[186664]" dev="sockfs" ino=186664 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9591.774403][ T31] audit: type=1400 audit(9591.680:207752): avc: denied { create } for pid=3079 comm="syz.3.15394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9591.797378][ T31] audit: type=1400 audit(9591.700:207753): avc: denied { setopt } for pid=3079 comm="syz.3.15394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9591.802445][ T31] audit: type=1400 audit(9591.710:207754): avc: denied { connect } for pid=3079 comm="syz.3.15394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9591.817420][ T31] audit: type=1400 audit(9591.720:207755): avc: denied { ioctl } for pid=3079 comm="syz.3.15394" path="socket:[185795]" dev="sockfs" ino=185795 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9591.961162][ T31] audit: type=1400 audit(9591.870:207756): avc: denied { create } for pid=3081 comm="syz.3.15395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9591.997945][ T31] audit: type=1400 audit(9591.900:207757): avc: denied { setopt } for pid=3081 comm="syz.3.15395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9592.012703][ T31] audit: type=1400 audit(9591.920:207758): avc: denied { connect } for pid=3081 comm="syz.3.15395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9592.542015][ T31] audit: type=1400 audit(9592.450:207759): avc: denied { setopt } for pid=3081 comm="syz.3.15395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9594.986091][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 9594.986274][ T31] audit: type=1400 audit(9594.890:207770): avc: denied { ioctl } for pid=3087 comm="syz.2.15392" path="socket:[186681]" dev="sockfs" ino=186681 ioctlcmd=0x510b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9595.029942][ T31] audit: type=1400 audit(9594.930:207771): avc: denied { ioctl } for pid=3087 comm="syz.2.15392" path="socket:[186681]" dev="sockfs" ino=186681 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9595.030129][ T31] audit: type=1400 audit(9594.930:207772): avc: denied { write } for pid=3087 comm="syz.2.15392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9595.175674][ T31] audit: type=1400 audit(9595.080:207773): avc: denied { ioctl } for pid=3091 comm="syz.3.15397" path="socket:[186686]" dev="sockfs" ino=186686 ioctlcmd=0x64c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9595.393764][ T31] audit: type=1400 audit(9595.300:207774): avc: denied { write } for pid=3087 comm="syz.2.15392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9595.682574][ T31] audit: type=1400 audit(9595.590:207775): avc: denied { read } for pid=3091 comm="syz.3.15397" path="socket:[186686]" dev="sockfs" ino=186686 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9597.255494][ T31] audit: type=1400 audit(9597.160:207776): avc: denied { create } for pid=3098 comm="syz.3.15399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9597.268781][ T31] audit: type=1400 audit(9597.170:207777): avc: denied { setopt } for pid=3098 comm="syz.3.15399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9597.269025][ T31] audit: type=1400 audit(9597.170:207778): avc: denied { connect } for pid=3098 comm="syz.3.15399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9597.269135][ T31] audit: type=1400 audit(9597.170:207779): avc: denied { ioctl } for pid=3098 comm="syz.3.15399" path="socket:[185825]" dev="sockfs" ino=185825 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9600.120941][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 9600.121178][ T31] audit: type=1400 audit(9600.030:207821): avc: denied { ioctl } for pid=3097 comm="syz.2.15398" path="socket:[186708]" dev="sockfs" ino=186708 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9600.155048][ T31] audit: type=1400 audit(9600.060:207822): avc: denied { read } for pid=3118 comm="syz.3.15405" path="socket:[186705]" dev="sockfs" ino=186705 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9600.156098][ T31] audit: type=1400 audit(9600.060:207823): avc: denied { read } for pid=3118 comm="syz.3.15405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9600.181479][ T31] audit: type=1400 audit(9600.090:207824): avc: denied { ioctl } for pid=3097 comm="syz.2.15398" path="socket:[186700]" dev="sockfs" ino=186700 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9600.915796][ T31] audit: type=1400 audit(9600.820:207825): avc: denied { write } for pid=3097 comm="syz.2.15398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9601.826156][ T31] audit: type=1400 audit(9601.730:207826): avc: denied { create } for pid=3124 comm="syz.3.15406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9601.836813][ T31] audit: type=1400 audit(9601.740:207827): avc: denied { setopt } for pid=3124 comm="syz.3.15406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9601.864327][ T31] audit: type=1400 audit(9601.770:207828): avc: denied { ioctl } for pid=3124 comm="syz.3.15406" path="socket:[186713]" dev="sockfs" ino=186713 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9601.867662][ T31] audit: type=1400 audit(9601.770:207829): avc: denied { write } for pid=3124 comm="syz.3.15406" path="socket:[186713]" dev="sockfs" ino=186713 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9601.998320][ T31] audit: type=1400 audit(9601.900:207830): avc: denied { create } for pid=3126 comm="syz.3.15407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9605.427308][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 9605.427623][ T31] audit: type=1400 audit(9605.330:207847): avc: denied { create } for pid=3133 comm="syz.2.15408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9606.514254][ T31] audit: type=1400 audit(9606.420:207848): avc: denied { create } for pid=3137 comm="syz.3.15410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9606.536446][ T31] audit: type=1400 audit(9606.440:207849): avc: denied { write } for pid=3137 comm="syz.3.15410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9606.543200][ T31] audit: type=1400 audit(9606.450:207850): avc: denied { setopt } for pid=3137 comm="syz.3.15410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9606.549039][ T31] audit: type=1400 audit(9606.450:207851): avc: denied { connect } for pid=3137 comm="syz.3.15410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9607.063578][ T31] audit: type=1400 audit(9606.970:207852): avc: denied { ioctl } for pid=3137 comm="syz.3.15410" path="socket:[186740]" dev="sockfs" ino=186740 ioctlcmd=0x64c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9607.583874][ T31] audit: type=1400 audit(9607.490:207853): avc: denied { read } for pid=3137 comm="syz.3.15410" path="socket:[186740]" dev="sockfs" ino=186740 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9607.626381][ T31] audit: type=1400 audit(9607.530:207854): avc: denied { ioctl } for pid=3133 comm="syz.2.15408" path="socket:[186733]" dev="sockfs" ino=186733 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9607.647536][ T31] audit: type=1400 audit(9607.550:207855): avc: denied { module_request } for pid=3133 comm="syz.2.15408" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9608.069943][ T31] audit: type=1400 audit(9607.960:207856): avc: denied { sys_module } for pid=3133 comm="syz.2.15408" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9610.442927][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 9610.443286][ T31] audit: type=1400 audit(9610.350:207880): avc: denied { write } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9610.483539][ T31] audit: type=1400 audit(9610.370:207881): avc: denied { create } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9610.483895][ T31] audit: type=1400 audit(9610.380:207882): avc: denied { ioctl } for pid=3150 comm="syz.3.15414" path="socket:[186751]" dev="sockfs" ino=186751 ioctlcmd=0x9421 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9610.484103][ T31] audit: type=1400 audit(9610.380:207883): avc: denied { create } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 9610.484300][ T31] audit: type=1400 audit(9610.390:207884): avc: denied { getopt } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 9610.484495][ T31] audit: type=1400 audit(9610.390:207885): avc: denied { write } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9610.484714][ T31] audit: type=1400 audit(9610.390:207886): avc: denied { module_request } for pid=3150 comm="syz.3.15414" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9610.722522][ T31] audit: type=1400 audit(9610.630:207887): avc: denied { read } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9610.730689][ T31] audit: type=1400 audit(9610.640:207888): avc: denied { read } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9610.743986][ T31] audit: type=1400 audit(9610.650:207889): avc: denied { write } for pid=3150 comm="syz.3.15414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9615.566154][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 9615.566375][ T31] audit: type=1400 audit(9615.470:207916): avc: denied { read } for pid=3170 comm="syz.3.15420" path="socket:[186763]" dev="sockfs" ino=186763 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9615.580717][ T31] audit: type=1400 audit(9615.490:207917): avc: denied { write } for pid=3170 comm="syz.3.15420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9615.711413][ T31] audit: type=1400 audit(9615.620:207918): avc: denied { create } for pid=3169 comm="syz.2.15418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9616.101491][ T31] audit: type=1400 audit(9616.010:207919): avc: denied { write } for pid=3170 comm="syz.3.15420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9617.784261][ T31] audit: type=1400 audit(9617.690:207920): avc: denied { create } for pid=3176 comm="syz.3.15422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9617.803717][ T31] audit: type=1400 audit(9617.710:207921): avc: denied { write } for pid=3176 comm="syz.3.15422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9617.806979][ T31] audit: type=1400 audit(9617.710:207922): avc: denied { setopt } for pid=3176 comm="syz.3.15422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9617.812303][ T31] audit: type=1400 audit(9617.710:207923): avc: denied { ioctl } for pid=3176 comm="syz.3.15422" path="socket:[186771]" dev="sockfs" ino=186771 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9617.812731][ T31] audit: type=1400 audit(9617.720:207924): avc: denied { read } for pid=3176 comm="syz.3.15422" path="socket:[186771]" dev="sockfs" ino=186771 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9617.955206][ T31] audit: type=1400 audit(9617.860:207925): avc: denied { create } for pid=3179 comm="syz.3.15423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9618.570256][ T4532] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9618.648862][ T4532] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9618.704221][ T4532] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9618.785604][ T4532] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9619.047428][ T4532] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9619.056089][ T4532] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9619.057772][ T4532] bond0 (unregistering): Released all slaves [ 9619.102825][ T4532] hsr_slave_0: left promiscuous mode [ 9619.103864][ T4532] hsr_slave_1: left promiscuous mode [ 9619.110351][ T4532] veth1_macvtap: left promiscuous mode [ 9619.110498][ T4532] veth0_macvtap: left promiscuous mode [ 9619.110854][ T4532] veth1_vlan: left promiscuous mode [ 9620.350231][ T3186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 9620.354237][ T3186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 9620.690980][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 9620.691384][ T31] audit: type=1400 audit(9620.580:208057): avc: denied { module_request } for pid=3186 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9620.876408][ T31] audit: type=1400 audit(9620.780:208058): avc: denied { write } for pid=3389 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9620.891852][ T31] audit: type=1400 audit(9620.790:208059): avc: denied { open } for pid=3389 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9620.923359][ T31] audit: type=1400 audit(9620.830:208060): avc: denied { sys_module } for pid=3186 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9620.926081][ T31] audit: type=1400 audit(9620.830:208061): avc: denied { module_request } for pid=3186 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9621.148145][ T31] audit: type=1400 audit(9621.050:208062): avc: denied { write } for pid=3392 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9621.148477][ T31] audit: type=1400 audit(9621.050:208063): avc: denied { write open } for pid=3392 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9621.164880][ T31] audit: type=1400 audit(9621.070:208064): avc: denied { module_request } for pid=3186 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9621.180725][ T31] audit: type=1400 audit(9621.090:208065): avc: denied { search } for pid=3392 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9621.180931][ T31] audit: type=1400 audit(9621.090:208066): avc: denied { search } for pid=3392 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9621.911657][ T3186] hsr_slave_0: entered promiscuous mode [ 9621.913624][ T3186] hsr_slave_1: entered promiscuous mode [ 9621.914094][ T3186] debugfs: 'hsr0' already exists in 'hsr' [ 9621.914166][ T3186] Cannot create hsr debugfs directory [ 9622.673672][ T3186] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 9622.685280][ T3186] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 9622.702835][ T3186] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 9622.707969][ T3186] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 9623.433112][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9624.035687][ T3186] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 9625.725887][ T31] kauditd_printk_skb: 424 callbacks suppressed [ 9625.726382][ T31] audit: type=1400 audit(9625.630:208491): avc: denied { search } for pid=3590 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9625.740349][ T31] audit: type=1400 audit(9625.650:208492): avc: denied { read } for pid=3590 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9625.740895][ T31] audit: type=1400 audit(9625.650:208493): avc: denied { open } for pid=3590 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9625.742866][ T31] audit: type=1400 audit(9625.650:208494): avc: denied { search } for pid=3590 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9625.743906][ T31] audit: type=1400 audit(9625.650:208495): avc: denied { search } for pid=3590 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9625.744191][ T31] audit: type=1400 audit(9625.650:208496): avc: denied { search } for pid=3590 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9625.745708][ T31] audit: type=1400 audit(9625.650:208497): avc: denied { read } for pid=3590 comm="cmp" name="resolv.conf.eth10.link" dev="tmpfs" ino=314 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9625.746122][ T31] audit: type=1400 audit(9625.650:208498): avc: denied { open } for pid=3590 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth10.link" dev="tmpfs" ino=314 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9625.746961][ T31] audit: type=1400 audit(9625.650:208499): avc: denied { getattr } for pid=3590 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9625.820188][ T31] audit: type=1400 audit(9625.720:208500): avc: denied { module_request } for pid=3186 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9626.483148][ T3186] veth0_vlan: entered promiscuous mode [ 9626.508587][ T3186] veth1_vlan: entered promiscuous mode [ 9626.541754][ T3186] veth0_macvtap: entered promiscuous mode [ 9626.546726][ T3186] veth1_macvtap: entered promiscuous mode [ 9626.586628][ T3233] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 9626.587296][ T3233] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 9626.587854][ T3233] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 9626.588406][ T3233] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 9631.661179][ T31] kauditd_printk_skb: 272 callbacks suppressed [ 9631.661466][ T31] audit: type=1400 audit(9631.570:208773): avc: denied { write } for pid=3637 comm="syz.3.15435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9632.323562][ T31] audit: type=1400 audit(9632.230:208774): avc: denied { create } for pid=3647 comm="syz.3.15438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9632.475990][ T31] audit: type=1400 audit(9632.370:208775): avc: denied { connect } for pid=3647 comm="syz.3.15438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9632.551815][ T31] audit: type=1400 audit(9632.460:208776): avc: denied { create } for pid=3649 comm="syz.3.15439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9632.646757][ T31] audit: type=1400 audit(9632.550:208777): avc: denied { create } for pid=3651 comm="syz.3.15440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 9632.649085][ T31] audit: type=1400 audit(9632.550:208778): avc: denied { write } for pid=3651 comm="syz.3.15440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 9632.657266][ T31] audit: type=1400 audit(9632.560:208779): avc: denied { create } for pid=3651 comm="syz.3.15440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 9632.657617][ T31] audit: type=1400 audit(9632.560:208780): avc: denied { read } for pid=3651 comm="syz.3.15440" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9632.657715][ T31] audit: type=1400 audit(9632.560:208781): avc: denied { open } for pid=3651 comm="syz.3.15440" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9632.671447][ T31] audit: type=1400 audit(9632.580:208782): avc: denied { ioctl } for pid=3651 comm="syz.3.15440" path="/dev/zero" dev="devtmpfs" ino=5 ioctlcmd=0x54e3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9637.805954][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 9637.806311][ T31] audit: type=1400 audit(9637.710:208811): avc: denied { create } for pid=3671 comm="syz.2.15446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9638.121192][ T31] audit: type=1400 audit(9638.030:208812): avc: denied { create } for pid=3674 comm="syz.3.15447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9638.128030][ T31] audit: type=1400 audit(9638.030:208813): avc: denied { setopt } for pid=3674 comm="syz.3.15447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9638.147021][ T31] audit: type=1400 audit(9638.050:208814): avc: denied { connect } for pid=3674 comm="syz.3.15447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9638.558577][ T31] audit: type=1400 audit(9638.460:208815): avc: denied { create } for pid=3671 comm="syz.2.15446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9638.651266][ T31] audit: type=1400 audit(9638.560:208816): avc: denied { ioctl } for pid=3674 comm="syz.3.15447" path="socket:[187716]" dev="sockfs" ino=187716 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9638.664772][ T31] audit: type=1400 audit(9638.570:208817): avc: denied { create } for pid=3671 comm="syz.2.15446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9638.810902][ T31] audit: type=1400 audit(9638.720:208818): avc: denied { write } for pid=3671 comm="syz.2.15446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9638.891580][ T31] audit: type=1400 audit(9638.720:208819): avc: denied { module_request } for pid=3671 comm="syz.2.15446" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9639.060752][ T31] audit: type=1400 audit(9638.970:208820): avc: denied { read } for pid=3671 comm="syz.2.15446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9643.411353][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 9643.411598][ T31] audit: type=1400 audit(9643.320:208849): avc: denied { create } for pid=3692 comm="syz.2.15452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9643.856478][ T31] audit: type=1400 audit(9643.760:208850): avc: denied { setopt } for pid=3692 comm="syz.2.15452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9643.993909][ T31] audit: type=1400 audit(9643.900:208851): avc: denied { setopt } for pid=3692 comm="syz.2.15452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9644.011039][ T31] audit: type=1400 audit(9643.920:208852): avc: denied { connect } for pid=3692 comm="syz.2.15452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9644.147260][ T31] audit: type=1400 audit(9644.050:208853): avc: denied { create } for pid=3694 comm="syz.3.15453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9644.156814][ T31] audit: type=1400 audit(9644.060:208854): avc: denied { connect } for pid=3694 comm="syz.3.15453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9644.257911][ T31] audit: type=1400 audit(9644.160:208855): avc: denied { create } for pid=3696 comm="syz.3.15454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9644.280576][ T31] audit: type=1400 audit(9644.190:208856): avc: denied { setopt } for pid=3696 comm="syz.3.15454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9644.285334][ T31] audit: type=1400 audit(9644.190:208857): avc: denied { connect } for pid=3696 comm="syz.3.15454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9644.763220][ T31] audit: type=1400 audit(9644.670:208858): avc: denied { ioctl } for pid=3696 comm="syz.3.15454" path="socket:[187764]" dev="sockfs" ino=187764 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9647.682256][ T3709] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3709 comm=syz.3.15459 [ 9648.742551][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 9648.742751][ T31] audit: type=1400 audit(9648.650:208886): avc: denied { setopt } for pid=3708 comm="syz.3.15459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9648.951896][ T31] audit: type=1400 audit(9648.860:208887): avc: denied { create } for pid=3710 comm="syz.2.15457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9649.193068][ T31] audit: type=1400 audit(9649.100:208888): avc: denied { setopt } for pid=3710 comm="syz.2.15457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9649.222386][ T31] audit: type=1400 audit(9649.130:208889): avc: denied { create } for pid=3710 comm="syz.2.15457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9649.373468][ T31] audit: type=1400 audit(9649.280:208890): avc: denied { ioctl } for pid=3710 comm="syz.2.15457" path="socket:[187797]" dev="sockfs" ino=187797 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9649.383128][ T31] audit: type=1400 audit(9649.290:208891): avc: denied { bind } for pid=3710 comm="syz.2.15457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9649.430895][ T31] audit: type=1400 audit(9649.340:208892): avc: denied { write } for pid=3710 comm="syz.2.15457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9649.551903][ T31] audit: type=1400 audit(9649.460:208893): avc: denied { connect } for pid=3710 comm="syz.2.15457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9650.072234][ T31] audit: type=1400 audit(9649.980:208894): avc: denied { ioctl } for pid=3710 comm="syz.2.15457" path="socket:[187051]" dev="sockfs" ino=187051 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9650.303792][ T31] audit: type=1400 audit(9650.210:208895): avc: denied { create } for pid=3715 comm="syz.3.15460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9653.833622][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 9653.834072][ T31] audit: type=1400 audit(9653.740:208913): avc: denied { create } for pid=3729 comm="syz.3.15465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9653.865995][ T31] audit: type=1400 audit(9653.770:208914): avc: denied { setopt } for pid=3729 comm="syz.3.15465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9653.877740][ T31] audit: type=1400 audit(9653.780:208915): avc: denied { connect } for pid=3729 comm="syz.3.15465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9653.883949][ T31] audit: type=1400 audit(9653.790:208916): avc: denied { ioctl } for pid=3729 comm="syz.3.15465" path="socket:[187831]" dev="sockfs" ino=187831 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9653.888633][ T31] audit: type=1400 audit(9653.790:208917): avc: denied { write } for pid=3729 comm="syz.3.15465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9653.982295][ T31] audit: type=1400 audit(9653.890:208918): avc: denied { create } for pid=3732 comm="syz.3.15467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9654.014805][ T31] audit: type=1400 audit(9653.920:208919): avc: denied { setopt } for pid=3732 comm="syz.3.15467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9654.017176][ T31] audit: type=1400 audit(9653.920:208920): avc: denied { connect } for pid=3732 comm="syz.3.15467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9654.520964][ T31] audit: type=1400 audit(9654.430:208921): avc: denied { ioctl } for pid=3732 comm="syz.3.15467" path="socket:[187072]" dev="sockfs" ino=187072 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9654.984538][ T31] audit: type=1400 audit(9654.890:208922): avc: denied { create } for pid=3731 comm="syz.2.15466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9659.790125][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 9659.790458][ T31] audit: type=1400 audit(9659.700:208938): avc: denied { create } for pid=3750 comm="syz.3.15471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9659.796503][ T31] audit: type=1400 audit(9659.700:208939): avc: denied { setopt } for pid=3750 comm="syz.3.15471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9659.798962][ T31] audit: type=1400 audit(9659.700:208940): avc: denied { connect } for pid=3750 comm="syz.3.15471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9659.802876][ T31] audit: type=1400 audit(9659.710:208941): avc: denied { ioctl } for pid=3750 comm="syz.3.15471" path="socket:[187086]" dev="sockfs" ino=187086 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9659.804804][ T31] audit: type=1400 audit(9659.710:208942): avc: denied { write } for pid=3750 comm="syz.3.15471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9659.890711][ T31] audit: type=1400 audit(9659.790:208943): avc: denied { create } for pid=3752 comm="syz.3.15472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9659.910582][ T31] audit: type=1400 audit(9659.820:208944): avc: denied { create } for pid=3752 comm="syz.3.15472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9659.910924][ T31] audit: type=1400 audit(9659.820:208945): avc: denied { write } for pid=3752 comm="syz.3.15472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9659.913859][ T31] audit: type=1400 audit(9659.820:208946): avc: denied { read } for pid=3752 comm="syz.3.15472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9659.937339][ T31] audit: type=1400 audit(9659.830:208947): avc: denied { ioctl } for pid=3752 comm="syz.3.15472" path="socket:[187089]" dev="sockfs" ino=187089 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9664.818450][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 9664.823869][ T31] audit: type=1400 audit(9664.720:209002): avc: denied { create } for pid=3785 comm="syz.3.15484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9664.846399][ T31] audit: type=1400 audit(9664.750:209003): avc: denied { ioctl } for pid=3775 comm="syz.2.15481" path="socket:[187959]" dev="sockfs" ino=187959 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9664.861439][ T31] audit: type=1400 audit(9664.760:209004): avc: denied { setopt } for pid=3785 comm="syz.3.15484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9664.861864][ T31] audit: type=1400 audit(9664.760:209005): avc: denied { create } for pid=3785 comm="syz.3.15484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9664.862204][ T31] audit: type=1400 audit(9664.770:209006): avc: denied { ioctl } for pid=3785 comm="syz.3.15484" path="socket:[187982]" dev="sockfs" ino=187982 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9664.862392][ T31] audit: type=1400 audit(9664.770:209007): avc: denied { bind } for pid=3785 comm="syz.3.15484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9664.868642][ T31] audit: type=1400 audit(9664.770:209008): avc: denied { write } for pid=3785 comm="syz.3.15484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9664.868838][ T31] audit: type=1400 audit(9664.770:209009): avc: denied { connect } for pid=3785 comm="syz.3.15484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9665.216706][ T31] audit: type=1400 audit(9665.120:209010): avc: denied { write } for pid=3785 comm="syz.3.15484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9665.453266][ T31] audit: type=1400 audit(9665.360:209011): avc: denied { write } for pid=3775 comm="syz.2.15481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9671.361408][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 9671.361791][ T31] audit: type=1400 audit(9671.270:209039): avc: denied { create } for pid=3804 comm="syz.2.15490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9671.768611][ T31] audit: type=1400 audit(9671.670:209040): avc: denied { create } for pid=3806 comm="syz.3.15491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9671.779117][ T31] audit: type=1400 audit(9671.680:209041): avc: denied { setopt } for pid=3806 comm="syz.3.15491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9671.783466][ T31] audit: type=1400 audit(9671.690:209042): avc: denied { connect } for pid=3806 comm="syz.3.15491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9672.291597][ T31] audit: type=1400 audit(9672.200:209043): avc: denied { ioctl } for pid=3806 comm="syz.3.15491" path="socket:[188006]" dev="sockfs" ino=188006 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9672.305617][ T31] audit: type=1400 audit(9672.210:209044): avc: denied { create } for pid=3804 comm="syz.2.15490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9672.351492][ T31] audit: type=1400 audit(9672.260:209045): avc: denied { ioctl } for pid=3804 comm="syz.2.15490" path="socket:[187260]" dev="sockfs" ino=187260 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9672.481320][ T31] audit: type=1400 audit(9672.390:209046): avc: denied { create } for pid=3804 comm="syz.2.15490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9672.599659][ T31] audit: type=1400 audit(9672.500:209047): avc: denied { ioctl } for pid=3804 comm="syz.2.15490" path="socket:[187260]" dev="sockfs" ino=187260 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9672.805457][ T31] audit: type=1400 audit(9672.710:209048): avc: denied { write } for pid=3806 comm="syz.3.15491" name="comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9676.522920][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 9676.523160][ T31] audit: type=1400 audit(9676.430:209064): avc: denied { create } for pid=3822 comm="syz.3.15495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9676.531976][ T31] audit: type=1400 audit(9676.440:209065): avc: denied { setopt } for pid=3822 comm="syz.3.15495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9676.534602][ T31] audit: type=1400 audit(9676.440:209066): avc: denied { create } for pid=3822 comm="syz.3.15495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9676.538815][ T31] audit: type=1400 audit(9676.440:209067): avc: denied { ioctl } for pid=3822 comm="syz.3.15495" path="socket:[187281]" dev="sockfs" ino=187281 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9676.541014][ T31] audit: type=1400 audit(9676.450:209068): avc: denied { bind } for pid=3822 comm="syz.3.15495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9676.542869][ T31] audit: type=1400 audit(9676.450:209069): avc: denied { write } for pid=3822 comm="syz.3.15495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9676.545393][ T31] audit: type=1400 audit(9676.450:209070): avc: denied { connect } for pid=3822 comm="syz.3.15495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9676.604089][ T31] audit: type=1400 audit(9676.510:209071): avc: denied { setopt } for pid=3818 comm="syz.2.15493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9676.681489][ T31] audit: type=1400 audit(9676.590:209072): avc: denied { connect } for pid=3818 comm="syz.2.15493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9677.061546][ T31] audit: type=1400 audit(9676.970:209073): avc: denied { write } for pid=3822 comm="syz.3.15495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9681.950972][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 9681.951173][ T31] audit: type=1400 audit(9681.860:209103): avc: denied { create } for pid=3838 comm="syz.3.15501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9681.977118][ T31] audit: type=1400 audit(9681.880:209104): avc: denied { read } for pid=3838 comm="syz.3.15501" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9681.977736][ T31] audit: type=1400 audit(9681.880:209105): avc: denied { open } for pid=3838 comm="syz.3.15501" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9681.991155][ T31] audit: type=1400 audit(9681.900:209106): avc: denied { create } for pid=3838 comm="syz.3.15501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9681.992838][ T31] audit: type=1400 audit(9681.900:209107): avc: denied { ioctl } for pid=3838 comm="syz.3.15501" path="socket:[188062]" dev="sockfs" ino=188062 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9681.996984][ T31] audit: type=1400 audit(9681.900:209108): avc: denied { create } for pid=3838 comm="syz.3.15501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9682.003134][ T31] audit: type=1400 audit(9681.910:209109): avc: denied { ioctl } for pid=3838 comm="syz.3.15501" path="socket:[188062]" dev="sockfs" ino=188062 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9682.062756][ T31] audit: type=1400 audit(9681.970:209110): avc: denied { create } for pid=3840 comm="syz.3.15502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9682.082384][ T31] audit: type=1400 audit(9681.990:209111): avc: denied { setopt } for pid=3840 comm="syz.3.15502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9682.084724][ T31] audit: type=1400 audit(9681.990:209112): avc: denied { connect } for pid=3840 comm="syz.3.15502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9687.152717][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 9687.153198][ T31] audit: type=1400 audit(9687.060:209144): avc: denied { ioctl } for pid=3857 comm="syz.3.15508" path="socket:[188103]" dev="sockfs" ino=188103 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9687.271388][ T31] audit: type=1400 audit(9687.180:209145): avc: denied { ioctl } for pid=3847 comm="syz.2.15503" path="socket:[187326]" dev="sockfs" ino=187326 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9687.657598][ T31] audit: type=1400 audit(9687.560:209146): avc: denied { ioctl } for pid=3857 comm="syz.3.15508" path="socket:[188103]" dev="sockfs" ino=188103 ioctlcmd=0x64c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9688.161033][ T31] audit: type=1400 audit(9688.070:209147): avc: denied { read } for pid=3857 comm="syz.3.15508" path="socket:[188103]" dev="sockfs" ino=188103 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9689.381192][ T31] audit: type=1400 audit(9689.290:209148): avc: denied { create } for pid=3864 comm="syz.2.15509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9689.738270][ T31] audit: type=1400 audit(9689.640:209149): avc: denied { create } for pid=3866 comm="syz.3.15510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9689.815532][ T31] audit: type=1400 audit(9689.720:209150): avc: denied { create } for pid=3868 comm="syz.3.15511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9689.851465][ T31] audit: type=1400 audit(9689.750:209151): avc: denied { read } for pid=3868 comm="syz.3.15511" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9689.855606][ T31] audit: type=1400 audit(9689.760:209152): avc: denied { read open } for pid=3868 comm="syz.3.15511" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9689.883353][ T31] audit: type=1400 audit(9689.790:209153): avc: denied { create } for pid=3868 comm="syz.3.15511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9692.602781][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 9692.603008][ T31] audit: type=1400 audit(9692.510:209169): avc: denied { read } for pid=3873 comm="syz.3.15514" path="socket:[188146]" dev="sockfs" ino=188146 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9693.522049][ T31] audit: type=1400 audit(9693.430:209170): avc: denied { ioctl } for pid=3872 comm="syz.2.15513" path="socket:[187343]" dev="sockfs" ino=187343 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9694.192969][ T31] audit: type=1400 audit(9694.100:209171): avc: denied { create } for pid=3881 comm="syz.3.15515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9694.291328][ T31] audit: type=1400 audit(9694.200:209172): avc: denied { create } for pid=3883 comm="syz.3.15516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9694.315827][ T31] audit: type=1400 audit(9694.220:209173): avc: denied { read } for pid=3883 comm="syz.3.15516" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9694.317242][ T31] audit: type=1400 audit(9694.220:209174): avc: denied { read open } for pid=3883 comm="syz.3.15516" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9694.334449][ T31] audit: type=1400 audit(9694.240:209175): avc: denied { create } for pid=3883 comm="syz.3.15516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9694.337418][ T31] audit: type=1400 audit(9694.240:209176): avc: denied { ioctl } for pid=3883 comm="syz.3.15516" path="socket:[188166]" dev="sockfs" ino=188166 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9694.342931][ T31] audit: type=1400 audit(9694.250:209177): avc: denied { create } for pid=3883 comm="syz.3.15516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9694.347030][ T31] audit: type=1400 audit(9694.250:209178): avc: denied { ioctl } for pid=3883 comm="syz.3.15516" path="socket:[188166]" dev="sockfs" ino=188166 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9697.660359][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 9697.660585][ T31] audit: type=1400 audit(9697.570:209213): avc: denied { read } for pid=3890 comm="syz.2.15519" path="socket:[188186]" dev="sockfs" ino=188186 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.692595][ T31] audit: type=1400 audit(9697.600:209214): avc: denied { ioctl } for pid=3904 comm="syz.3.15524" path="socket:[188216]" dev="sockfs" ino=188216 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.694184][ T31] audit: type=1400 audit(9697.600:209215): avc: denied { write } for pid=3904 comm="syz.3.15524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9697.753455][ T31] audit: type=1400 audit(9697.660:209216): avc: denied { create } for pid=3906 comm="syz.3.15525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.758504][ T31] audit: type=1400 audit(9697.660:209217): avc: denied { write } for pid=3906 comm="syz.3.15525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.760904][ T31] audit: type=1400 audit(9697.670:209218): avc: denied { setopt } for pid=3906 comm="syz.3.15525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.766176][ T31] audit: type=1400 audit(9697.670:209219): avc: denied { connect } for pid=3906 comm="syz.3.15525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.768201][ T31] audit: type=1400 audit(9697.670:209220): avc: denied { ioctl } for pid=3906 comm="syz.3.15525" path="socket:[188226]" dev="sockfs" ino=188226 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.772197][ T31] audit: type=1400 audit(9697.680:209221): avc: denied { read } for pid=3906 comm="syz.3.15525" path="socket:[188226]" dev="sockfs" ino=188226 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9697.825612][ T31] audit: type=1400 audit(9697.730:209222): avc: denied { create } for pid=3908 comm="syz.3.15526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9702.790937][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 9702.791129][ T31] audit: type=1400 audit(9702.700:209274): avc: denied { create } for pid=3935 comm="syz.2.15535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9703.092915][ T31] audit: type=1400 audit(9703.000:209275): avc: denied { read } for pid=3930 comm="syz.3.15534" path="socket:[188286]" dev="sockfs" ino=188286 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9703.094217][ T31] audit: type=1400 audit(9703.000:209276): avc: denied { read } for pid=3930 comm="syz.3.15534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9703.120975][ T31] audit: type=1400 audit(9703.030:209277): avc: denied { setopt } for pid=3935 comm="syz.2.15535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9703.162963][ T31] audit: type=1400 audit(9703.070:209278): avc: denied { create } for pid=3935 comm="syz.2.15535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9703.165978][ T31] audit: type=1400 audit(9703.070:209279): avc: denied { ioctl } for pid=3935 comm="syz.2.15535" path="socket:[188445]" dev="sockfs" ino=188445 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9703.196314][ T31] audit: type=1400 audit(9703.100:209280): avc: denied { connect } for pid=3935 comm="syz.2.15535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9703.596834][ T31] audit: type=1400 audit(9703.500:209281): avc: denied { write } for pid=3930 comm="syz.3.15534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9703.929937][ T31] audit: type=1400 audit(9703.830:209282): avc: denied { ioctl } for pid=3935 comm="syz.2.15535" path="socket:[188442]" dev="sockfs" ino=188442 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9704.103442][ T31] audit: type=1400 audit(9704.010:209283): avc: denied { write } for pid=3930 comm="syz.3.15534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9708.837698][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 9708.837922][ T31] audit: type=1400 audit(9708.740:209294): avc: denied { create } for pid=3954 comm="syz.3.15540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9708.845302][ T31] audit: type=1400 audit(9708.750:209295): avc: denied { setopt } for pid=3954 comm="syz.3.15540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9708.851618][ T31] audit: type=1400 audit(9708.760:209296): avc: denied { create } for pid=3954 comm="syz.3.15540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9708.855201][ T31] audit: type=1400 audit(9708.760:209297): avc: denied { bind } for pid=3954 comm="syz.3.15540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9708.873115][ T31] audit: type=1400 audit(9708.780:209298): avc: denied { connect } for pid=3954 comm="syz.3.15540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9709.081867][ T31] audit: type=1400 audit(9708.990:209299): avc: denied { create } for pid=3952 comm="syz.2.15539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9709.254307][ T31] audit: type=1400 audit(9709.160:209300): avc: denied { write } for pid=3952 comm="syz.2.15539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9709.363254][ T31] audit: type=1400 audit(9709.270:209301): avc: denied { ioctl } for pid=3954 comm="syz.3.15540" path="socket:[188313]" dev="sockfs" ino=188313 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9709.520760][ T31] audit: type=1400 audit(9709.430:209302): avc: denied { setopt } for pid=3952 comm="syz.2.15539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9709.631185][ T31] audit: type=1400 audit(9709.540:209303): avc: denied { connect } for pid=3952 comm="syz.2.15539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9714.135519][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 9714.135718][ T31] audit: type=1400 audit(9714.040:209326): avc: denied { write } for pid=3965 comm="syz.3.15544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9715.192576][ T31] audit: type=1400 audit(9715.100:209327): avc: denied { create } for pid=3972 comm="syz.2.15545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9715.307417][ T31] audit: type=1400 audit(9715.210:209328): avc: denied { write } for pid=3972 comm="syz.2.15545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9715.421560][ T31] audit: type=1400 audit(9715.330:209329): avc: denied { setopt } for pid=3972 comm="syz.2.15545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9715.567717][ T31] audit: type=1400 audit(9715.470:209330): avc: denied { connect } for pid=3972 comm="syz.2.15545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9715.740727][ T31] audit: type=1400 audit(9715.650:209331): avc: denied { read } for pid=3974 comm="syz.3.15546" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9715.741251][ T31] audit: type=1400 audit(9715.650:209332): avc: denied { open } for pid=3974 comm="syz.3.15546" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9715.749055][ T31] audit: type=1400 audit(9715.650:209333): avc: denied { ioctl } for pid=3974 comm="syz.3.15546" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x54d1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9715.752006][ T31] audit: type=1400 audit(9715.660:209334): avc: denied { create } for pid=3974 comm="syz.3.15546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9715.812968][ T31] audit: type=1400 audit(9715.720:209335): avc: denied { ioctl } for pid=3972 comm="syz.2.15545" path="socket:[188478]" dev="sockfs" ino=188478 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9719.820766][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 9719.821200][ T31] audit: type=1400 audit(9719.730:209352): avc: denied { ioctl } for pid=3982 comm="syz.2.15549" path="socket:[188494]" dev="sockfs" ino=188494 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9720.400765][ T31] audit: type=1400 audit(9720.310:209353): avc: denied { read } for pid=3982 comm="syz.2.15549" path="socket:[188494]" dev="sockfs" ino=188494 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9720.984263][ T31] audit: type=1400 audit(9720.890:209354): avc: denied { read write } for pid=3991 comm="syz.3.15551" name="audio1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9720.984475][ T31] audit: type=1400 audit(9720.890:209355): avc: denied { open } for pid=3991 comm="syz.3.15551" path="/dev/audio1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9720.993054][ T3992] FAULT_INJECTION: forcing a failure. [ 9720.993054][ T3992] name failslab, interval 1, probability 0, space 0, times 0 [ 9720.993241][ T3992] CPU: 1 UID: 0 PID: 3992 Comm: syz.3.15551 Not tainted syzkaller #0 PREEMPT [ 9720.993286][ T3992] Hardware name: ARM-Versatile Express [ 9720.993298][ T3992] Call trace: [ 9720.993319][ T3992] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 9720.993386][ T3992] r7:00000820 r6:00000000 r5:60000013 r4:82260b30 [ 9720.993396][ T3992] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 9720.993420][ T3992] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 9720.993445][ T3992] r5:83a9e000 r4:82917c00 [ 9720.993452][ T3992] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 9720.993480][ T3992] [<80972c00>] (should_fail_ex) from [<8051f318>] (should_failslab+0x6c/0x94) [ 9720.993511][ T3992] r8:83a9e000 r7:00000820 r6:847d1598 r5:0000001b r4:83001240 [ 9720.993519][ T3992] [<8051f2ac>] (should_failslab) from [<8050495c>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 9720.993543][ T3992] [<805048bc>] (__kmalloc_node_track_caller_noprof) from [<8049b740>] (kmemdup_noprof+0x28/0x44) [ 9720.993573][ T3992] r10:00000022 r9:848e1604 r8:ea9a1ca8 r7:83a1a000 r6:847d1598 r5:ea9a1ca0 [ 9720.993583][ T3992] r4:0000001b [ 9720.993590][ T3992] [<8049b718>] (kmemdup_noprof) from [<807a2118>] (sidtab_sid2str_get+0x54/0xa4) [ 9720.993620][ T3992] r7:83a1a000 r6:ea9a1ca8 r5:ea9a1ca0 r4:833c0180 [ 9720.993629][ T3992] [<807a20c4>] (sidtab_sid2str_get) from [<807a9620>] (sidtab_entry_to_string+0x34/0x94) [ 9720.993656][ T3992] r7:83a1a000 r6:833c0180 r5:ea9a1ca0 r4:00000022 [ 9720.993664][ T3992] [<807a95ec>] (sidtab_entry_to_string) from [<807a9798>] (security_sid_to_context_core+0x118/0x17c) [ 9720.993693][ T3992] r9:00000000 r8:83a1a000 r7:848e1604 r6:ea9a1ca8 r5:ea9a1ca0 r4:00000022 [ 9720.993701][ T3992] [<807a9680>] (security_sid_to_context_core) from [<807ac7ac>] (security_sid_to_context+0x1c/0x24) [ 9720.993810][ T3992] r8:8078c8d0 r7:8078d8d4 r6:83a9e000 r5:84790f30 r4:ea9a1d30 [ 9720.993823][ T3992] [<807ac790>] (security_sid_to_context) from [<8078d954>] (avc_audit_post_callback+0x80/0x2f4) [ 9720.993911][ T3992] [<8078d8d4>] (avc_audit_post_callback) from [<807b4d68>] (common_lsm_audit+0x104/0x148) [ 9720.994050][ T3992] r10:00000022 r9:00000000 r8:8078c8d0 r7:8078d8d4 r6:ea9a1eac r5:84790f30 [ 9720.994177][ T3992] r4:83a9e7f0 [ 9720.994347][ T3992] [<807b4c64>] (common_lsm_audit) from [<8078dde0>] (slow_avc_audit+0xbc/0x114) [ 9720.994409][ T3992] r8:00000050 r7:00000000 r6:00000001 r5:0000005f r4:00000022 [ 9720.994639][ T3992] [<8078dd24>] (slow_avc_audit) from [<8078e194>] (avc_has_extended_perms+0x208/0x6a8) [ 9720.995016][ T3992] r5:0000000b r4:0000005f [ 9720.995224][ T3992] [<8078df8c>] (avc_has_extended_perms) from [<80797c34>] (ioctl_has_perm.constprop.0+0xe4/0x160) [ 9720.995323][ T3992] r10:83a9e000 r9:84180f84 r8:00000050 r7:83f91058 r6:0000005f r5:8247154c [ 9720.995333][ T3992] r4:00000012 [ 9720.995341][ T3992] [<80797b50>] (ioctl_has_perm.constprop.0) from [<80797d54>] (selinux_file_ioctl+0xa4/0x134) [ 9720.995372][ T3992] r9:00000003 r8:854aec00 r7:20000100 r6:20000100 r5:800c5012 r4:854aec00 [ 9720.995382][ T3992] [<80797cb0>] (selinux_file_ioctl) from [<80770a50>] (security_file_ioctl+0x90/0x1e4) [ 9720.995630][ T3992] [<807709c0>] (security_file_ioctl) from [<8056ce10>] (sys_ioctl+0x4c/0xba0) [ 9720.995826][ T3992] r7:20000100 r6:854aec01 r5:00000000 r4:800c5012 [ 9720.995938][ T3992] [<8056cdc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9720.996250][ T3992] Exception stack(0xea9a1fa8 to 0xea9a1ff0) [ 9720.996333][ T3992] 1fa0: 00000000 00000000 00000003 800c5012 20000100 00000000 [ 9720.996385][ T3992] 1fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f740bc [ 9720.996526][ T3992] 1fe0: 76f73ec0 76f73eb0 0001948c 001322a0 [ 9720.996543][ T3992] r10:00000036 r9:83a9e000 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 9720.996554][ T3992] r4:00000000 [ 9721.003248][ T31] audit: type=1400 audit(9720.900:209356): avc: denied { ioctl } for pid=3991 comm="syz.3.15551" path="/dev/audio1" dev="devtmpfs" ino=733 ioctlcmd=0x5012 scontext=root:sysadm_r:sysadm_t tsid=34 tclass=chr_file permissive=1 [ 9721.148388][ T31] audit: type=1400 audit(9721.050:209357): avc: denied { create } for pid=3993 comm="syz.3.15552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9721.164203][ T31] audit: type=1400 audit(9721.070:209358): avc: denied { write } for pid=3993 comm="syz.3.15552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9721.172414][ T31] audit: type=1400 audit(9721.080:209359): avc: denied { setopt } for pid=3993 comm="syz.3.15552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9721.175837][ T31] audit: type=1400 audit(9721.080:209360): avc: denied { connect } for pid=3993 comm="syz.3.15552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9721.191778][ T31] audit: type=1400 audit(9721.100:209361): avc: denied { ioctl } for pid=3993 comm="syz.3.15552" path="socket:[188392]" dev="sockfs" ino=188392 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9725.235077][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 9725.235287][ T31] audit: type=1400 audit(9725.140:209386): avc: denied { ioctl } for pid=4007 comm="syz.3.15557" path="socket:[188511]" dev="sockfs" ino=188511 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9725.241434][ T31] audit: type=1400 audit(9725.150:209387): avc: denied { create } for pid=4004 comm="syz.2.15555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9725.317627][ T31] audit: type=1400 audit(9725.220:209388): avc: denied { setopt } for pid=4004 comm="syz.2.15555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9725.461425][ T31] audit: type=1400 audit(9725.370:209389): avc: denied { connect } for pid=4004 comm="syz.2.15555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9725.743794][ T31] audit: type=1400 audit(9725.650:209390): avc: denied { ioctl } for pid=4007 comm="syz.3.15557" path="socket:[188511]" dev="sockfs" ino=188511 ioctlcmd=0x64c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9726.141281][ T31] audit: type=1400 audit(9726.050:209391): avc: denied { ioctl } for pid=4004 comm="syz.2.15555" path="socket:[189443]" dev="sockfs" ino=189443 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9727.329072][ T31] audit: type=1400 audit(9727.230:209392): avc: denied { create } for pid=4015 comm="syz.3.15558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9727.342037][ T31] audit: type=1400 audit(9727.250:209393): avc: denied { setopt } for pid=4015 comm="syz.3.15558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9727.421588][ T31] audit: type=1400 audit(9727.330:209394): avc: denied { map_create } for pid=4017 comm="syz.3.15559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9727.426432][ T31] audit: type=1400 audit(9727.330:209395): avc: denied { read } for pid=4017 comm="syz.3.15559" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9730.246728][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 9730.246952][ T31] audit: type=1400 audit(9730.150:209409): avc: denied { ioctl } for pid=4022 comm="syz.2.15561" path="socket:[189471]" dev="sockfs" ino=189471 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9730.518482][ T31] audit: type=1400 audit(9730.420:209410): avc: denied { module_request } for pid=4019 comm="syz.3.15560" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9730.525896][ T31] audit: type=1400 audit(9730.420:209411): avc: denied { sys_module } for pid=4019 comm="syz.3.15560" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9730.736245][ T31] audit: type=1400 audit(9730.640:209412): avc: denied { create } for pid=4029 comm="syz.3.15562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9730.761432][ T31] audit: type=1400 audit(9730.660:209413): avc: denied { write } for pid=4029 comm="syz.3.15562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9730.774065][ T31] audit: type=1400 audit(9730.680:209414): avc: denied { setopt } for pid=4029 comm="syz.3.15562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9730.778289][ T31] audit: type=1400 audit(9730.680:209415): avc: denied { connect } for pid=4029 comm="syz.3.15562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9731.281674][ T31] audit: type=1400 audit(9731.190:209416): avc: denied { ioctl } for pid=4029 comm="syz.3.15562" path="socket:[188520]" dev="sockfs" ino=188520 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9731.551521][ T31] audit: type=1400 audit(9731.460:209417): avc: denied { read } for pid=4022 comm="syz.2.15561" path="socket:[189471]" dev="sockfs" ino=189471 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9731.621834][ T31] audit: type=1400 audit(9731.530:209418): avc: denied { write } for pid=4022 comm="syz.2.15561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9735.281770][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 9735.282185][ T31] audit: type=1400 audit(9735.190:209434): avc: denied { ioctl } for pid=4041 comm="syz.2.15564" path="socket:[189487]" dev="sockfs" ino=189487 ioctlcmd=0x8917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9735.932199][ T31] audit: type=1400 audit(9735.840:209435): avc: denied { execmem } for pid=4041 comm="syz.2.15564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 9736.028270][ T31] audit: type=1400 audit(9735.930:209436): avc: denied { create } for pid=4045 comm="syz.3.15566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9736.036833][ T31] audit: type=1400 audit(9735.940:209437): avc: denied { setopt } for pid=4045 comm="syz.3.15566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9736.040802][ T31] audit: type=1400 audit(9735.940:209438): avc: denied { connect } for pid=4045 comm="syz.3.15566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9736.113363][ T31] audit: type=1400 audit(9736.020:209439): avc: denied { execmem } for pid=4041 comm="syz.2.15564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 9736.531414][ T31] audit: type=1400 audit(9736.440:209440): avc: denied { nlmsg_write } for pid=4041 comm="syz.2.15564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 9736.545031][ T31] audit: type=1400 audit(9736.450:209441): avc: denied { write } for pid=4045 comm="syz.3.15566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9736.653882][ T31] audit: type=1400 audit(9736.560:209442): avc: denied { ioctl } for pid=4045 comm="syz.3.15566" path="socket:[189488]" dev="sockfs" ino=189488 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9736.656729][ T31] audit: type=1400 audit(9736.560:209443): avc: denied { module_request } for pid=4045 comm="syz.3.15566" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9740.364285][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 9740.364466][ T31] audit: type=1400 audit(9740.270:209467): avc: denied { create } for pid=4062 comm="syz.2.15569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9740.670621][ T31] audit: type=1400 audit(9740.580:209468): avc: denied { ioctl } for pid=4060 comm="syz.3.15571" path="socket:[189507]" dev="sockfs" ino=189507 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9740.691700][ T31] audit: type=1400 audit(9740.600:209469): avc: denied { setopt } for pid=4062 comm="syz.2.15569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9740.744197][ T31] audit: type=1400 audit(9740.650:209470): avc: denied { connect } for pid=4062 comm="syz.2.15569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9741.190978][ T31] audit: type=1400 audit(9741.100:209471): avc: denied { write } for pid=4060 comm="syz.3.15571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9741.537944][ T31] audit: type=1400 audit(9741.440:209472): avc: denied { ioctl } for pid=4062 comm="syz.2.15569" path="socket:[188568]" dev="sockfs" ino=188568 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9742.230918][ T31] audit: type=1400 audit(9742.140:209473): avc: denied { read } for pid=4062 comm="syz.2.15569" path="socket:[188568]" dev="sockfs" ino=188568 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9742.697184][ T31] audit: type=1400 audit(9742.600:209474): avc: denied { module_request } for pid=4060 comm="syz.3.15571" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9742.697486][ T31] audit: type=1400 audit(9742.600:209475): avc: denied { sys_module } for pid=4060 comm="syz.3.15571" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9742.844051][ T31] audit: type=1400 audit(9742.750:209476): avc: denied { create } for pid=4072 comm="syz.3.15572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.476979][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 9745.477221][ T31] audit: type=1400 audit(9745.380:209490): avc: denied { create } for pid=4078 comm="syz.3.15574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.485154][ T31] audit: type=1400 audit(9745.390:209491): avc: denied { setopt } for pid=4078 comm="syz.3.15574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.488667][ T31] audit: type=1400 audit(9745.390:209492): avc: denied { connect } for pid=4078 comm="syz.3.15574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.511530][ T31] audit: type=1400 audit(9745.420:209493): avc: denied { create } for pid=4078 comm="syz.3.15574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9745.522380][ T31] audit: type=1400 audit(9745.430:209494): avc: denied { ioctl } for pid=4078 comm="syz.3.15574" path="socket:[189522]" dev="sockfs" ino=189522 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.525908][ T31] audit: type=1400 audit(9745.430:209495): avc: denied { write } for pid=4078 comm="syz.3.15574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.528665][ T31] audit: type=1400 audit(9745.430:209496): avc: denied { write } for pid=4078 comm="syz.3.15574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.599270][ T31] audit: type=1400 audit(9745.500:209497): avc: denied { create } for pid=4080 comm="syz.3.15575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9745.614288][ T31] audit: type=1400 audit(9745.520:209498): avc: denied { create } for pid=4080 comm="syz.3.15575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9745.616942][ T31] audit: type=1400 audit(9745.520:209499): avc: denied { ioctl } for pid=4080 comm="syz.3.15575" path="socket:[188595]" dev="sockfs" ino=188595 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9750.962264][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 9750.962451][ T31] audit: type=1400 audit(9750.870:209545): avc: denied { create } for pid=4098 comm="syz.3.15578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9750.966751][ T31] audit: type=1400 audit(9750.870:209546): avc: denied { create } for pid=4098 comm="syz.3.15578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9750.977783][ T31] audit: type=1400 audit(9750.880:209547): avc: denied { write } for pid=4098 comm="syz.3.15578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9750.982705][ T31] audit: type=1400 audit(9750.890:209548): avc: denied { write } for pid=4098 comm="syz.3.15578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9751.262243][ T31] audit: type=1400 audit(9751.170:209549): avc: denied { write } for pid=4094 comm="syz.2.15577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9751.262907][ T31] audit: type=1400 audit(9751.170:209550): avc: denied { read } for pid=4094 comm="syz.2.15577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9751.273622][ T31] audit: type=1400 audit(9751.180:209551): avc: denied { ioctl } for pid=4094 comm="syz.2.15577" path="socket:[188618]" dev="sockfs" ino=188618 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9751.274835][ T31] audit: type=1400 audit(9751.180:209552): avc: denied { module_request } for pid=4094 comm="syz.2.15577" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9751.490162][ T31] audit: type=1400 audit(9751.390:209553): avc: denied { ioctl } for pid=4098 comm="syz.3.15578" path="socket:[188611]" dev="sockfs" ino=188611 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9751.524075][ T31] audit: type=1400 audit(9751.430:209554): avc: denied { sys_module } for pid=4094 comm="syz.2.15577" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9755.313515][ T4118] FAULT_INJECTION: forcing a failure. [ 9755.313515][ T4118] name failslab, interval 1, probability 0, space 0, times 0 [ 9755.313894][ T4118] CPU: 1 UID: 0 PID: 4118 Comm: syz.3.15581 Not tainted syzkaller #0 PREEMPT [ 9755.313990][ T4118] Hardware name: ARM-Versatile Express [ 9755.314052][ T4118] Call trace: [ 9755.314141][ T4118] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 9755.314279][ T4118] r7:00000c40 r6:00000000 r5:60000013 r4:82260b30 [ 9755.314305][ T4118] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 9755.314359][ T4118] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 9755.314414][ T4118] r5:8670c800 r4:82917c00 [ 9755.314432][ T4118] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 9755.314487][ T4118] [<80972c00>] (should_fail_ex) from [<8051f318>] (should_failslab+0x6c/0x94) [ 9755.314556][ T4118] r8:8670c800 r7:00000c40 r6:865889e8 r5:00001000 r4:830016c0 [ 9755.314573][ T4118] [<8051f2ac>] (should_failslab) from [<80503ca8>] (__kmalloc_noprof+0x9c/0x458) [ 9755.314619][ T4118] [<80503c0c>] (__kmalloc_noprof) from [<807c37ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 9755.314684][ T4118] r10:8670c800 r9:833c8000 r8:00000000 r7:851bc6e8 r6:865889e8 r5:00001000 [ 9755.314705][ T4118] r4:00000000 [ 9755.314722][ T4118] [<807c3770>] (tomoyo_realpath_from_path) from [<807bf8f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 9755.314779][ T4118] r10:8670c800 r9:00000000 r8:865889c0 r7:41009432 r6:00000004 r5:81cd6504 [ 9755.314801][ T4118] r4:865889e8 r3:826c0200 [ 9755.314817][ T4118] [<807bf824>] (tomoyo_path_number_perm) from [<807c41d0>] (tomoyo_file_ioctl+0x1c/0x20) [ 9755.314872][ T4118] r9:00000004 r8:865889c0 r7:00000000 r6:00000000 r5:41009432 r4:865889c0 [ 9755.314888][ T4118] [<807c41b4>] (tomoyo_file_ioctl) from [<80770a24>] (security_file_ioctl+0x64/0x1e4) [ 9755.314955][ T4118] [<807709c0>] (security_file_ioctl) from [<8056ce10>] (sys_ioctl+0x4c/0xba0) [ 9755.315006][ T4118] r7:00000000 r6:865889c1 r5:00000000 r4:41009432 [ 9755.315023][ T4118] [<8056cdc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9755.315125][ T4118] Exception stack(0xeaa65fa8 to 0xeaa65ff0) [ 9755.315295][ T4118] 5fa0: 00000000 00000000 00000004 41009432 00000000 00000000 [ 9755.315598][ T4118] 5fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f530bc [ 9755.315663][ T4118] 5fe0: 76f52ec0 76f52eb0 0001948c 001322a0 [ 9755.315728][ T4118] r10:00000036 r9:8670c800 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 9755.315794][ T4118] r4:00000000 [ 9755.332492][ T4118] ERROR: Out of memory at tomoyo_realpath_from_path. [ 9756.329150][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 9756.330530][ T31] audit: type=1400 audit(9756.230:209573): avc: denied { write } for pid=4116 comm="syz.3.15581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9756.986451][ T31] audit: type=1400 audit(9756.890:209574): avc: denied { create } for pid=4120 comm="syz.2.15582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9757.155759][ T31] audit: type=1400 audit(9757.060:209575): avc: denied { setopt } for pid=4120 comm="syz.2.15582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9757.450834][ T31] audit: type=1400 audit(9757.360:209576): avc: denied { connect } for pid=4120 comm="syz.2.15582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9758.027498][ T31] audit: type=1400 audit(9757.930:209577): avc: denied { create } for pid=4126 comm="syz.3.15584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9758.046334][ T31] audit: type=1400 audit(9757.950:209578): avc: denied { setopt } for pid=4126 comm="syz.3.15584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9758.048979][ T31] audit: type=1400 audit(9757.950:209579): avc: denied { connect } for pid=4126 comm="syz.3.15584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9758.302531][ T31] audit: type=1400 audit(9758.210:209580): avc: denied { write } for pid=4120 comm="syz.2.15582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9758.567361][ T31] audit: type=1400 audit(9758.470:209581): avc: denied { ioctl } for pid=4126 comm="syz.3.15584" path="socket:[188652]" dev="sockfs" ino=188652 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9759.001788][ T31] audit: type=1400 audit(9758.910:209582): avc: denied { ioctl } for pid=4120 comm="syz.2.15582" path="socket:[188642]" dev="sockfs" ino=188642 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9761.810987][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 9761.811291][ T31] audit: type=1400 audit(9761.710:209592): avc: denied { create } for pid=4138 comm="syz.3.15585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9761.815340][ T31] audit: type=1400 audit(9761.720:209593): avc: denied { ioctl } for pid=4138 comm="syz.3.15585" path="socket:[189559]" dev="sockfs" ino=189559 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9762.320882][ T31] audit: type=1400 audit(9762.230:209594): avc: denied { write } for pid=4138 comm="syz.3.15585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9762.498933][ T31] audit: type=1400 audit(9762.400:209595): avc: denied { create } for pid=4140 comm="syz.2.15586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9762.587612][ T31] audit: type=1400 audit(9762.490:209596): avc: denied { ioctl } for pid=4140 comm="syz.2.15586" path="socket:[188667]" dev="sockfs" ino=188667 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9762.700252][ T31] audit: type=1400 audit(9762.610:209597): avc: denied { bind } for pid=4140 comm="syz.2.15586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9762.750872][ T31] audit: type=1400 audit(9762.660:209598): avc: denied { write } for pid=4140 comm="syz.2.15586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9763.941099][ T31] audit: type=1400 audit(9763.850:209599): avc: denied { read } for pid=4148 comm="syz.3.15589" dev="nsfs" ino=4026532639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9763.942196][ T31] audit: type=1400 audit(9763.850:209600): avc: denied { open } for pid=4148 comm="syz.3.15589" path="net:[4026532639]" dev="nsfs" ino=4026532639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9763.943867][ T31] audit: type=1400 audit(9763.850:209601): avc: denied { create } for pid=4148 comm="syz.3.15589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9767.112859][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 9767.113208][ T31] audit: type=1400 audit(9767.020:209610): avc: denied { module_request } for pid=4150 comm="syz.3.15590" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9767.113481][ T31] audit: type=1400 audit(9767.020:209611): avc: denied { sys_module } for pid=4150 comm="syz.3.15590" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9767.226164][ T31] audit: type=1400 audit(9767.130:209612): avc: denied { create } for pid=4159 comm="syz.3.15591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9767.254112][ T31] audit: type=1400 audit(9767.160:209613): avc: denied { ioctl } for pid=4159 comm="syz.3.15591" path="socket:[189579]" dev="sockfs" ino=189579 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9767.267245][ T31] audit: type=1400 audit(9767.170:209614): avc: denied { bind } for pid=4159 comm="syz.3.15591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9767.291873][ T31] audit: type=1400 audit(9767.200:209615): avc: denied { write } for pid=4159 comm="syz.3.15591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9767.464215][ T31] audit: type=1400 audit(9767.370:209616): avc: denied { create } for pid=4161 comm="syz.3.15592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9767.473166][ T31] audit: type=1400 audit(9767.380:209617): avc: denied { setopt } for pid=4161 comm="syz.3.15592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9767.473584][ T31] audit: type=1400 audit(9767.380:209618): avc: denied { connect } for pid=4161 comm="syz.3.15592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9767.977745][ T31] audit: type=1400 audit(9767.880:209619): avc: denied { create } for pid=4161 comm="syz.3.15592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9772.619987][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 9772.620384][ T31] audit: type=1400 audit(9772.520:209668): avc: denied { setattr } for pid=4185 comm="syz.3.15603" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9773.147033][ T31] audit: type=1400 audit(9773.050:209669): avc: denied { ioctl } for pid=4185 comm="syz.3.15603" path="socket:[188765]" dev="sockfs" ino=188765 ioctlcmd=0xf513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.495076][ T31] audit: type=1400 audit(9774.400:209670): avc: denied { create } for pid=4196 comm="syz.2.15604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.579130][ T31] audit: type=1400 audit(9774.480:209671): avc: denied { setopt } for pid=4196 comm="syz.2.15604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.670606][ T31] audit: type=1400 audit(9774.580:209672): avc: denied { setopt } for pid=4196 comm="syz.2.15604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.702674][ T31] audit: type=1400 audit(9774.610:209673): avc: denied { create } for pid=4198 comm="syz.3.15605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.708337][ T31] audit: type=1400 audit(9774.610:209674): avc: denied { setopt } for pid=4198 comm="syz.3.15605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.721696][ T31] audit: type=1400 audit(9774.630:209675): avc: denied { connect } for pid=4196 comm="syz.2.15604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.722299][ T31] audit: type=1400 audit(9774.630:209676): avc: denied { connect } for pid=4198 comm="syz.3.15605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9774.724155][ T31] audit: type=1400 audit(9774.630:209677): avc: denied { setopt } for pid=4198 comm="syz.3.15605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9778.601944][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 9778.602342][ T31] audit: type=1400 audit(9778.510:209709): avc: denied { create } for pid=4221 comm="syz.3.15611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9778.613877][ T31] audit: type=1400 audit(9778.510:209710): avc: denied { write } for pid=4221 comm="syz.3.15611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9778.614245][ T31] audit: type=1400 audit(9778.510:209711): avc: denied { write } for pid=4221 comm="syz.3.15611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9778.706400][ T31] audit: type=1400 audit(9778.610:209712): avc: denied { create } for pid=4223 comm="syz.3.15612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9778.709257][ T31] audit: type=1400 audit(9778.610:209713): avc: denied { ioctl } for pid=4223 comm="syz.3.15612" path="socket:[188809]" dev="sockfs" ino=188809 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9778.715044][ T31] audit: type=1400 audit(9778.610:209714): avc: denied { write } for pid=4223 comm="syz.3.15612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9778.787508][ T31] audit: type=1400 audit(9778.690:209715): avc: denied { read } for pid=4225 comm="syz.3.15613" name="fb1" dev="devtmpfs" ino=762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9778.801716][ T31] audit: type=1400 audit(9778.710:209716): avc: denied { read open } for pid=4225 comm="syz.3.15613" path="/dev/fb1" dev="devtmpfs" ino=762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9778.815547][ T31] audit: type=1400 audit(9778.720:209717): avc: denied { mounton } for pid=4225 comm="syz.3.15613" path="/142/file1/file4" dev="tmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 9778.822253][ T31] audit: type=1400 audit(9778.730:209718): avc: denied { mount } for pid=4225 comm="syz.3.15613" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 9782.678426][ T3233] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9782.788452][ T3233] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9782.864317][ T3233] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9782.923569][ T3233] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9783.201935][ T3233] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9783.207871][ T3233] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9783.220838][ T3233] bond0 (unregistering): Released all slaves [ 9783.294890][ T3233] hsr_slave_0: left promiscuous mode [ 9783.300685][ T3233] hsr_slave_1: left promiscuous mode [ 9783.311471][ T3233] veth1_macvtap: left promiscuous mode [ 9783.311772][ T3233] veth0_macvtap: left promiscuous mode [ 9783.312217][ T3233] veth1_vlan: left promiscuous mode [ 9783.860266][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 9783.861329][ T31] audit: type=1400 audit(9783.760:209760): avc: denied { module_request } for pid=4233 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9783.938026][ T31] audit: type=1400 audit(9783.840:209761): avc: denied { write } for pid=4336 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9783.959863][ T31] audit: type=1400 audit(9783.860:209762): avc: denied { write open } for pid=4336 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9783.993647][ T3233] ------------[ cut here ]------------ [ 9783.994163][ T3233] WARNING: CPU: 1 PID: 3233 at net ** replaying previous printk message ** [ 9783.994163][ T3233] WARNING: CPU: 1 PID: 3233 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0xd4/0x15c [ 9783.996541][ T3233] Modules linked in: [ 9783.997407][ T3233] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 9783.998176][ T3233] CPU: 1 UID: 0 PID: 3233 Comm: kworker/u8:3 Not tainted syzkaller #0 PREEMPT [ 9783.999101][ T3233] Hardware name: ARM-Versatile Express [ 9784.000251][ T3233] Workqueue: netns cleanup_net [ 9784.000788][ T3233] Call trace: [ 9784.001009][ T3233] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 9784.001363][ T3233] r7:00000000 r6:8281f77c r5:00000000 r4:82260b30 [ 9784.001628][ T3233] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 9784.002018][ T3233] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 9784.002369][ T3233] r5:00000000 r4:82a77d18 [ 9784.002555][ T3233] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 9784.002891][ T3233] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 9784.003199][ T3233] r7:8180138c [ 9784.003348][ T3233] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 9784.003650][ T3233] r3:8280c684 r2:00000001 r1:8224754c r0:8224efc8 [ 9784.003909][ T3233] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 9784.004250][ T3233] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 9784.004949][ T3233] r8:00000009 r7:8243ec28 r6:e0439dd4 r5:86703000 r4:00000000 [ 9784.005248][ T3233] [<80254bd0>] (warn_slowpath_fmt) from [<8180138c>] (xfrm_state_fini+0xd4/0x15c) [ 9784.005929][ T3233] r10:00000001 r9:00000001 r8:829dd028 r7:829eee90 r6:829dd028 r5:84fa9d80 [ 9784.006341][ T3233] r4:84fa9d80 [ 9784.006504][ T3233] [<818012b8>] (xfrm_state_fini) from [<817f2538>] (xfrm_net_exit+0x2c/0x40) [ 9784.006845][ T3233] r5:84fa9d80 r4:84fa9d80 [ 9784.007043][ T3233] [<817f250c>] (xfrm_net_exit) from [<81564c68>] (ops_undo_list+0xe8/0x238) [ 9784.007374][ T3233] r5:84fa9d80 r4:e0439e98 [ 9784.007569][ T3233] [<81564b80>] (ops_undo_list) from [<81566e2c>] (cleanup_net+0x20c/0x384) [ 9784.007984][ T3233] r10:00000000 r9:ffffffd4 r8:84fa8ec0 r7:829dd00c r6:829dcfe4 r5:82c1e640 [ 9784.008303][ T3233] r4:84fa9da0 [ 9784.008471][ T3233] [<81566c20>] (cleanup_net) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 9784.008835][ T3233] r10:8300f270 r9:8301c615 r8:86703000 r7:8300e600 r6:8301c600 r5:829dcffc [ 9784.009159][ T3233] r4:857bb100 [ 9784.009324][ T3233] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 9784.009970][ T3233] r10:61c88647 r9:86703000 r8:857bb12c r7:82804d40 r6:8300e600 r5:8300e620 [ 9784.010305][ T3233] r4:857bb100 [ 9784.010458][ T3233] [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280) [ 9784.010917][ T3233] r10:00000000 r9:857bb100 r8:8027ade4 r7:e01e5e60 r6:857bb080 r5:86703000 [ 9784.011237][ T3233] r4:00000001 [ 9784.011399][ T3233] [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 9784.011748][ T3233] Exception stack(0xe0439fb0 to 0xe0439ff8) [ 9784.012021][ T3233] 9fa0: 00000000 00000000 00000000 00000000 [ 9784.012416][ T3233] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9784.012807][ T3233] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9784.013121][ T3233] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 [ 9784.013466][ T3233] r4:84cccdc0 [ 9784.015801][ T3233] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:42:13 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=007b884c R02=00000800 R03=000007ff R04=7ed76e50 R05=7ed76fa8 R06=007b7e90 R07=0000018d R08=00000000 R09=007b8654 R10=007b35b8 R11=00000000 R12=7ed76e50 R13=7ed76e30 R14=76ea3fe4 R15=76d84b54 PSR=80070010 N--- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=f0400000 s05=f0400000 d02=f0400000f0400000 s06=00000000 s07=00000000 d03=0000000000000000 s08=40000000 s09=c0300000 d04=c030000040000000 s10=00000000 s11=80402010 d05=8040201000000000 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83a4e840 R01=00000056 R02=eae39000 R03=eae39018 R04=82abb11e R05=83a4e840 R06=80a79c9c R07=82abb12f R08=82826ef8 R09=00000000 R10=00009ec6 R11=e0439aac R12=00000002 R13=e0439aa0 R14=829590c4 R15=80a79cac PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000