last executing test programs: 33m20.225196297s ago: executing program 1 (id=378): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) socket$nl_rdma(0x10, 0x3, 0x14) socket$kcm(0x2, 0xa, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = syz_io_uring_setup(0x44cd, &(0x7f00000004c0)={0x0, 0x5331, 0x10100, 0x4, 0xfffefffe}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8'], 0x38}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 33m18.81938192s ago: executing program 1 (id=380): sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)={0x30, 0x0, 0xb97534d5fe9704cf, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}, @NL80211_ATTR_MAC={0xa}]}, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x40d0) 33m18.468947618s ago: executing program 1 (id=381): sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x28, 0x0, 0x1, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000005}, 0x4008000) 33m18.24779412s ago: executing program 0 (id=382): r0 = io_uring_setup(0xad5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3d0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv2(r1, &(0x7f0000000340)=[{&(0x7f0000000100)=""/65, 0x41}], 0x1, 0x0, 0x0, 0x0) close(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) 33m17.85869879s ago: executing program 1 (id=383): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x101491, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) 33m16.855236222s ago: executing program 1 (id=384): sigaltstack(&(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffed8}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaa"], 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800008080b63428e900"/20, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r0 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000040), 0xe09) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd000000801900", [0x0, 0x2000000000001]}}) 33m16.087220182s ago: executing program 1 (id=385): sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)={0x30, 0x0, 0xb97534d5fe9704cf, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}, @NL80211_ATTR_MAC={0xa}]}, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x40d0) 33m15.955972899s ago: executing program 32 (id=385): sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)={0x30, 0x0, 0xb97534d5fe9704cf, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}, @NL80211_ATTR_MAC={0xa}]}, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x40d0) 33m14.576258301s ago: executing program 0 (id=387): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r0, 0x0, 0x4008000) 33m14.319466454s ago: executing program 0 (id=388): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x3, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8c0) 33m13.885946777s ago: executing program 0 (id=389): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x101491, 0x0) 33m13.176407553s ago: executing program 0 (id=390): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x40089}, 0x8004) write$nci(r0, &(0x7f0000000300)=@NCI_OP_CORE_SET_CONFIG_RSP={0x0, 0x1, 0x2, 0x2, 0x3, {0x1, 0x4f, "8880a7089281aaed31a55331625f52b4fc090d6f783061c09749a171e8b267f5a41143f7d5f9ee2f8ecf6abaa21db1983eaf6562a08d70fb41227bc23ddce92cdf8bd8958393c862646fc1976b4b19"}}, 0x54) 33m8.106112027s ago: executing program 0 (id=391): r0 = io_uring_setup(0xad5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3d0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x2}) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)=""/65, 0x41}], 0x1, 0x0, 0x0, 0x0) close(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) 33m7.956807586s ago: executing program 33 (id=391): r0 = io_uring_setup(0xad5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3d0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x2}) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)=""/65, 0x41}], 0x1, 0x0, 0x0, 0x0) close(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) 31m56.78858265s ago: executing program 2 (id=400): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000200), 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0x2a, 0x5}, 0x24) timer_getoverrun(0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040004) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r3, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000140)=ANY=[], 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240), r1) 31m55.376115884s ago: executing program 2 (id=403): r0 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)=@chain) 31m54.555913746s ago: executing program 3 (id=405): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sched_switch\x00', r0, 0x0, 0x2000000005}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000004c0)=@nat={'nat\x00', 0x670, 0x5, 0x458, 0xb, 0x6, 0xfeffffff, 0xf0, 0x218, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'veth1_to_team\x00', {}, {}, 0x6}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2, 0x4}}, @common=@inet=@socket2={{0x28}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@set={{0x40}}, @common=@set={{0x40}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @remote, @icmp_id}}}}, {{@ip={@loopback, @rand_addr, 0x0, 0x0, 'lo\x00', 'ip6tnl0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}}, {{@ip={@remote, @broadcast, 0x0, 0x0, 'pim6reg0\x00', 'wlan0\x00'}, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@private2, @ipv4=@dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) 31m54.555723017s ago: executing program 2 (id=406): sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x3, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8c0) 31m53.689267572s ago: executing program 3 (id=407): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000200), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240), r0) 31m53.585651607s ago: executing program 2 (id=408): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x101491, 0x0) 31m52.802059738s ago: executing program 2 (id=409): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x6, 0x4) 31m52.225834328s ago: executing program 3 (id=410): socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec25, 0x400, 0x1, 0x40000333}, &(0x7f00000006c0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r1, 0x847ba, 0x0, 0xe, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000006c0)=0xa) 31m51.824994289s ago: executing program 2 (id=411): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f40)={&(0x7f0000001dc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x5, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x2e, 0x0, 0x61, 0x2e, 0x61]}}, 0x0, 0x30, 0x0, 0x1, 0x8}, 0x28) 31m51.755722652s ago: executing program 34 (id=411): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f40)={&(0x7f0000001dc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x5, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x2e, 0x0, 0x61, 0x2e, 0x61]}}, 0x0, 0x30, 0x0, 0x1, 0x8}, 0x28) 31m49.807156104s ago: executing program 3 (id=413): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x101491, 0x0) 31m48.840957034s ago: executing program 3 (id=414): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000200), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240), r0) 31m47.347431712s ago: executing program 3 (id=415): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x6, 0x4) 31m47.027677738s ago: executing program 35 (id=415): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x6, 0x4) 29m26.019819312s ago: executing program 5 (id=444): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f0000000000), 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="02130000050000000000000000000000030008"], 0x28}}, 0x0) 29m24.404891356s ago: executing program 5 (id=445): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) 29m5.262259853s ago: executing program 4 (id=449): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000001e80)={{r0}, "c77766ceddf42fe42d6d2410497532477a5da6d734c9b801d202a445b13c6559f95a523563989935bf87dbecf5515c78035f9283c94a0aca16d1656db34e9751537ad454c04f8ae7147dd590ed0972b253a53efbb46df704f58cc76c035109aeb1b0b9d116083c1bd2fb93a4dbd5a49e5b8c2ba1e45a25a5bf3b88c41caf6547cfe2e3f8ecf440ffc5066c3b8d1e49f7faaf1c15205b70a0477e339500a8949de2b58a38111e7793ecea27b1e2d8a8a85cac3264c99011efd37e90e19998d20779d69cdbe0f1782b4e61d15506f241e7abe49964a5c1f8ed1e79c106da54b27e887bfc196d2d6fa46560c05f3e731f7a84c6be474dec6acb656b3e92b963ca09ccb3df1951f09dc397e8ca7e13ec6cf97f0ab8c4b7263e831013fa4dfa9332a2774ec56abe3164018a9062a9b69c214091239d06171b297ab83a3e5292887c71b3a2818c060881adc52ff3140c379044db801013196e5d90e1a19d4678ff072ed4a894f0021ecba9eb137577afad81a339f6407974501913e110192010ce077620ac6e2991625c2a17cfc8ce9926ce6147e5fafd53b5b24313f7a42660c8f8aa88f6c75ab5e786dae2fe94388c2079b248cc6285995d0c20e7e8c81b823a8e42c363df95cf2ab45acdf496935bd85440bc7049787faeb43ca67f231778aaec583b663662031ed2acef89689dd01a0de095463d466512360ca14c815d93a626743b90a4fd7c3b247ff6ae3290af3957ebbc6df10476d7c514c440c518d136747d18689aafb162451262d195fa859015de8c273ab40471cd87c5fe978ae7b24eb70c40a2851a36b54a9496434cb27ef7ae3bf160d6aa84f31c304e1b8889e38258bc424fee0748528afe06b2e6bbaa47818b7b80c8b9bb209dab8f5826b414077afe8c2ca3110d86d89bbdfd0e726c460ad5b32f38749c2c73fb7d3c7c1c307722dc1b39ba4cde9dc6c0e9889130d37a4b4fc6f27cc7adec7c66a96b978a96ce2b62029e798dd579de1c7b8ca4f026d8e9ceee04c4f0f5d0749655b8b242c01f24229f69356dbfae794213bbb035c1a1e607587c56bd74bf1a2b221e684664b8ef95207e4f64dda523f7c9fe64363b4e82216ef46e8d8d2bf7fe8790cb288141d0c25848d1f5ee0314769596cc0b131d2062b1cd3f71aa50638b23d7704e370f9d5a8940a8e2741632e7855ed5fe062dd27dca88ef7185021bb6d228fdaf7d87c4621a0ab2c748488a04fbcd2f75f6dc02627406061546cb639ef854ad7aed4cbfcf51e53ef91dbcab2e0e390ec2d655999e9c9343be3a883e12d9109097efddf9ad573f3541f649f2a2ef9248b4ad7553a2ec2e5329aa6f7e685e2f019137014ff4e3b7f49b9356d78fdb211a450b3a0822a27b13c9a7e95aef369b9d73f89df9963d1896264c1fe7435f2352d9112267091c9dbceb1f03c271e7391c782d6b29ddcfb2313e434ea118bf5aab89c01701bbf8a617ac71fe8d0cc0e4809ec47d12e60103c49942e8f8ec951beba47cc1fd410bd1c880aa2aa99399ad0e76f86b59879814d05e44573fedf3c1a88b5b18a5e497d0a6bb1981b77f68e3f17c247b696222c8042b9505f9cae862d83606694332531e80898d5c0ccbca149f65e973f56bfd24b8685a582e3434f3d93e8fccd9e60a06eab0c7a581aac59820c1108d62da4021ad7a74851cd55626c30f8e9d19eb0e2deab935127a41be771b2b36053195f1db369b7b346d841b44ebabd8b98dca74ac71b0bb300267e801d62f4c8539954e468c204f7f8417ed440e09b90373acc5768d3253bf1b6580db40835033ff8343d7ea9a89e6c3abfa796aeff379bbf0d04b7ade2ac0b44a8356e44158eb7a035a7133ed25501b089964d5a777ae4c00ebc5f3b969b67f4da5475dacc4a0e39daa413e872e236dbc4f4ae2d017df73b203efd1441d5e82610b5c080c434baec663e73584603c79807ecd192dcba79dd757905592578d04815bb48a5977d72b9c7a25146f8da1d2a262961fb28309d5a7383c9662b8bee3520ca442114d2d276327b3e85fc7fa8c07099b9727efe30b2d623092337d903beefe54d6409753ff34f6c0f53201c017750fedec11083968a69cf7f07c67dfd366d9c8bfd8f89888dfafb3a68f6c675f11a0f7c3ac85e523d5289205c7a88e925e287edbfde6b3b0caecfab8837b45620af7c890edf9a3d6ecb296019409074f22dbfb0aa2f1426d9fa8c5e60d35024f8f6b9e9bef7b600e1d7e6d3bdbd6803f51a436d7cd4470448a1981eb40d851f9de71f7206ece2baa003b662d5d8af19554f66bc3103b41bc4265352d1593be7741bcb6e5c8234406a66c7b93a682ed483964fe6bddabdd8e9edb1b29977b4f79999c4758071b7518376d42a6bf9a37356c4f710c171ddc906ebb099bdab9f8abd714b42f9d29f312be33ce6e01e07e79f5eafb18bca258462df5675c2838775b2450d68addaadb855352774a828f0e8ce189ae53d685fea465cb54604ad59613075ab2064ea5d27f93e59a646e34ee1225a9c1b8d439e8c064f7d60d7a4cc564e984eb8d6a9a009ebef8d6b4ed95f687218113f4c7f32a39c7c7e9327dc8778c6a66c6a6e35b7f0ce24c1975a23e3769379141cee875b4f65c630b8e8b5a5a982d96b23f91d0b71d0901a6b33e00f3b67abab17a71a2cdafedd82501b6444e9c8fcd615bb689f7318c8ddf1457d54709fb98a0f73db49e476117a068b9f69ef6e19e39a5e28cf8de7963cfd4934efb9d1ee1f9f31ca7ff12c279abcad5e207f484b6314124f6908f945d8d4eb8393b59b6331dc072e8d7b975a66952cf3e59fff7c20428e46340309ebe4bfab3b53df8b6d8db2f02b4d677007967e6d72362b0ee77a960d6df5ba5dda262b61908b9e91fab9cc3547ccc35a646cdf92b68c0f51bc041e8a8b8451522948a098a0a88b3623d5b2c24be9a34957eed09b5aeac6b960f6d25fd005cd1d5bfb7669a5c9cde6532259f9f7be45ebc95f2a8e1099d480a2e55ee54ce988a1eef68d2371aecb9c0ab72af264580810a04b92a2f8463fdae424a9f731578b96283dab90bbe9370788ad7034df8f797d95274ed495925d774993390739ec2bbc6ce537b3e3936ef9a177507ea53d083f7fa4f0fade448d90e150268c24852004d29a70955c6785beaf079417d65b3d3f4ca8aa3e177b07c156d19e5e4b7ef7d26f0390fd5bc879363f62ee2d4c1f1de0cb9e8e276032ed694fe31e34b77cd0ee4432026800e59ceff5f84c17eb370c961e63e3c6f11b390fdd4da3aed478e8b6975b5cfdaa9e2b6e016d9fd8b01ff720a8af1b3420266ac0438c838d6ff44ee870cc86f98c33a8ef5456243aafba4c19d2a1f013b3070a3381838744471fa774456f960dccf1bc2f2cce72a283c8efd82f5fde21ffc7ed63eab38dc4926e43e7ae1b8a6c0260b847fc23711929e4e40804bb65782824bfdd73e31bb5ecd04dae3f3c7162b81c35d69b6681c0528941f1ed25cded599d163864d5707d7a170d9849eae8e10a19bc293c090730b8ff83fd9732a5e4ea36308284c4b30cb74974061d4dee2792980ab15b665579a82ff5095c659f20673b368319d9c106ecc9f6b42dc8e7b3171a14db78ef14d8b4a8a8f87900ef5098702dd8530a1a8b80f420527ee34f676ab6b6ac41a954d23c4010431d3c7840e34a8da79e53ebd60cb329d315584a4687ffa1c85df68caecac774467eef2a093fa7428059fa6392306a18164ffe0390af519904fd4dc8df111a7a1be124f24c99dc5368334b490e26d51b1920dff87eda8afe01399d75d9be45a79bd67ea6d546d92a293ede73511ee7024ff38b150b31e60b130fdded136432cc06fd69ca920c8cace8cbea4bcea9eb3b30f87a593f9c252910ff8fc7d4c57237bdd3dc8de12739f4a05de5f048984495ac3b32c351ce113db92004f9928c30c7192d5c1283c9e00f5454847d8f55d3dc61fe941982c3d634e80a7a486633f50976691ec3c5f794aaf63baf6b396dd4bd8b82e9a63bc81e2edceff721e0e6ce237cfb291166e262881d7dd007a05124227f56be39d4095c70cd0a7c7137f52a93e561938fba897568e1ab6c3b342baba5b88881573aeecc973888a6025ec94cf0268a23c504bbd8617642a0ec9d5809d101673e22aceab54a54c5c313f91e2e05b3b83c0418a5354b319dcd1ae5ddfd2e28586d782318ffb87e8f6319231b6b00e4e1f39ed8023c299c96972234231ba7017693778793c8bbd9a74e8ccf8799c35a80c6ac58f7798903d48d446a431969d5c96e488041ef71e0c3ceff2a3d8c4caa6790aaeb868dfeb1ac4bbae662d9def645aecedaafffc69abad654d018a7c5c987bc81731fda0e99bd7ae7c27d418d436141ffcddfa3bde70f42d02438e1c244be38ce8061f890b391a2f3e93a6ac430cae940b3fefd13d373c349afc0463d8ee4e5ee911f4fef8aa6db736e01ebdec1be594696c49e50e1d0c034efecc4942ec967d1ffbb1ca4ea42a3218342f9af7f09d99b2fbb6284a31f978328ed684cee4ddf7f05e7786cd8a8b1a920ac37f11b1c02829c18470d99381a6be5bd4233ad078266b7da5b801268f2f5498d238150d2f5844e29ab3116ea6f66334e9d27982678e00163e730ff24e04cb3a4a2a2e42a894576d3f58ac2914a56f2afeaa5404460439f596c18b0bf47201e113fcc30258c9becd191a0fe8f995f2f193ee0dc500030cb675ce8928506a4fecb43e8ce33e0fc1d9848fb0e19755fbd34b4ff612fef2326f7d4440bdd0f8b7868de9e0d77719a9ca1afb1c0b88b357029f173f19ced6d0aa40e416857f152af73acb83c12fe68a2674427e9f4ff31b7530b6247e0721f4e2b7f948c813c09a2b4aa4027186f939a1de9e984d17484184176769a982b308d92337ff2832737d45d1fe7a3ac77b388525835675529e99e5b402d62aeabbd0c017138b8f5635e8781530acc2e6ecd5574619408b87b41be968d4a0b74a7fa30169b1183b7d6fcbe4d1fae8ed64915dac6be4c06c238e96ad1aa665b102e91eabc2f27188fbc3024ffde02fdadcc935c8f11ea9813c87a3b891214be33c454ae28fb2e4795a1cd823ac030577fc797c49413368fd111d63c888eae7984d039e387215ccf8b6def92c6ae8ab8cf687f751669b517dacc29b8f4a579059e226d112a90516e1c7371a859f8f7c9905bb81d0a6a990c4ebcc16b5749763fe8a461887c75edd564ecb1bf08e04ec389e03ffef1e96693cf6160329486eefe6fe6f00582be9d7b37c55dce7315a73173e8ef3f7aa606f3c5dcd7082a8aaecc998b08c2c831e2ec42c887fb8a2a11dbbbf542819a525309793a534b4c2581c424005e7862295bd6bbe9fe84b835fc53d51fd7a5a2ab3e311b3affea269a0dec6e454efd432386e4b86b5995a2d2c5725d92caaa21b9b86f22fb91ed77238b1a8014747db80f24438b0912075f0a62f7a3c8028e596a0208a6fbe51c2f626856c06fc90babc5125b702dd57adf3b62d8f2ca570de901f3ee09d2609f8d7beedf291307d8d12f2a745efaea3af8b0e5ae823a0f3ea2cb9ee0f77b928ad73ad547d9c1272f69e2fd2e02e3ab8cbf3007ba10e4b209d16773f75ac4a9f663f8516eb2bd0727d335e533934ad9c9013284667ffa8391a5447f56066d4577cfe707442ee0e3833dbc1e6ee5287c5ab4d2c6c1caf22d7006f02bd7db748feaf6ec61f24ddb337df12eeed44572ed07e59c4c9a33c79a6c525bbe3d4b3ff24ffb2ed0948f159d69e912adc168531f4cfa1e3daa6421dda145889ad"}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) shutdown(r3, 0x0) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000040)=0x5, 0x4) recvmmsg(r3, &(0x7f0000008880), 0x45b, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) ftruncate(r2, 0x8800000) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r10, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000b80)=""/4096, 0x20001b80}, {&(0x7f0000001b80)=""/112, 0x70}], 0x2, 0x0, 0xa0028cb4}}], 0x40000000000013c, 0x700, 0x0) sendfile(r9, r2, 0x0, 0x578410e9) sendfile(r9, r2, 0x0, 0x100000000) 28m58.161625203s ago: executing program 4 (id=450): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000001c0)={r0}, &(0x7f0000000540)={'enc=', 'pkcs1', ' hash=', {'ghash-ce\x00'}}, 0x0, 0x0) 28m55.72355205s ago: executing program 4 (id=451): rt_sigaction(0x19, &(0x7f0000000000)={0xffffffffffffffff, 0x44000006, 0x0}, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) syz_emit_ethernet(0x4a, &(0x7f0000000580)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a8435", 0x14, 0x6, 0x0, @empty, @mcast2, {[], {{0x4e20, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x5, 0xc2}}}}}}}, 0x0) 28m53.496311356s ago: executing program 4 (id=452): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x101491, 0x0) 28m51.149134108s ago: executing program 4 (id=453): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x120) 28m50.016331267s ago: executing program 4 (id=454): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) 28m49.926576282s ago: executing program 36 (id=454): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) 28m48.524937505s ago: executing program 5 (id=456): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000016c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd27, 0x4000000, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xff}, 0x0, 0x1}}, @TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x0, 0x1ff, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x0, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x2, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0xfffffffd, 0x400000, 0x3, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb484, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xf20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x100, 0x0, 0x4, 0xfffffffd, 0x0, 0x0, 0x3ff, 0xfffffffe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffd]}]}}]}, 0x45c}}, 0x0) 28m47.410542403s ago: executing program 5 (id=457): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x101491, 0x0) 28m46.977459336s ago: executing program 5 (id=458): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) getresgid(&(0x7f0000000640), 0x0, 0x0) 28m45.960332838s ago: executing program 5 (id=459): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x11, 0x2, 0x4}, 0x0, 0x0) 28m45.858948024s ago: executing program 37 (id=459): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x11, 0x2, 0x4}, 0x0, 0x0) 3m52.307255496s ago: executing program 6 (id=1028): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x27, 0x5, 0x4, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, 0x0, 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x2) r5 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) 3m48.882301412s ago: executing program 6 (id=1029): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='-4'], 0xc) 3m48.099006383s ago: executing program 6 (id=1030): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 3m47.386825559s ago: executing program 6 (id=1031): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'bond_slave_0\x00', 0x200}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_int(r0, &(0x7f0000000240)=0x2, 0x12) 3m30.085983829s ago: executing program 6 (id=1033): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3m28.390678726s ago: executing program 6 (id=1034): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffbf) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5, &(0x7f0000000140)=@raw=[@generic={0x2, 0xa, 0xd, 0x8001, 0x200000}, @generic={0x81, 0x0, 0x8, 0x9, 0xfff}, @map_fd={0x18, 0x2}, @alu={0x7, 0x1, 0x5, 0x6, 0x6, 0x6, 0x18}], 0x0}, 0x94) write$cgroup_devices(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="1e0306003c5c980128876340860600702c1ffe8000000000"], 0xffdd) 2m42.589325492s ago: executing program 38 (id=1034): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffbf) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5, &(0x7f0000000140)=@raw=[@generic={0x2, 0xa, 0xd, 0x8001, 0x200000}, @generic={0x81, 0x0, 0x8, 0x9, 0xfff}, @map_fd={0x18, 0x2}, @alu={0x7, 0x1, 0x5, 0x6, 0x6, 0x6, 0x18}], 0x0}, 0x94) write$cgroup_devices(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="1e0306003c5c980128876340860600702c1ffe8000000000"], 0xffdd) 19.390299469s ago: executing program 8 (id=1147): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={0x1d, r1, 0x0, {0x0, 0x0, 0x4}}, 0x18) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1a000}}, 0xee) 18.557169102s ago: executing program 8 (id=1149): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x4000800}, 0x8000) 17.688582447s ago: executing program 8 (id=1150): unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@ipv4_newrule={0x1c, 0x20, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="2800000021000100"], 0x28}}, 0x0) 9.589809871s ago: executing program 7 (id=1156): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000000}, 0x19a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001a0007d1be648658434301000077"], 0x1c}}, 0x0) 8.484929527s ago: executing program 7 (id=1157): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c010000", @ANYRES16, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c00050004000002000002000800010003000000050002000300000005000200"], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r1], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) 6.549497536s ago: executing program 7 (id=1158): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0xfffc, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000b80)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "560400", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4}}}}}}}, 0x0) 5.791363624s ago: executing program 7 (id=1159): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000100)={0x14, 0x0, 0x411, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8000) 5.504885409s ago: executing program 8 (id=1160): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0x10, 0x0, 0x4000000, 0x1ffffffd, 0x100}}) 4.471562552s ago: executing program 7 (id=1161): mknodat$null(0xffffffffffffff9c, &(0x7f0000002440)='./file0\x00', 0x8000, 0x103) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002240), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2092) syz_fuse_handle_req(r0, &(0x7f0000002580)="5536182daefa2fc6ee10a1b2d4e27cff3c3e628d4656f7b27979e371b15b420c01ae674ddb8fff7b2bc41e7c5927065cd32f2ff7908ef7dd74cdc82f3799ab12edbbfd0b8f6d2194d7f72aec3a136e25c7bf733436bf6cbfc94431ad053a2ec4ccac5aaada8a41ac38c0e1849e599dce84e431ac501db105b4484146b338c0ae9124877ccb8273c7fbb32603251e2d66c71398a7a715bcbe5c9d87e41af55f837e2931c4c1b6b7bbc30dfedfe6e61a39e28f66bbe56496745fbe03f6035183257edac4b0fe3087e7f3e79c2152a07341f3ae9ec68e78875b6e12b5a2a1abbcca4d7963be818a7a31290cad5a025ccd05b609c7ac49ea85d49f354c1e76091a917966665e77471005a46a195b290c01bb7ddf4709e94543471d87a0a5047d3631b00862e1e9a00c60b83371cc16ba087463122a892a1b21786fe3d450c7ba97799d88126f09a698a421242e9c67c981ebc576f57ba3df22e0071db74fa22e97b0fbe589894931a4c4e0eda8bb9533c4ce503fba218d0ae43ab4b4d0c705e04442d093ca5299ae8499c6db904bda6c68105bc2a1cd8e16067215476e573745d1e99daa73400567a9978dd7bffb21429479ace30c95afdfaebd7faf74343cd58e14ce6d2fada5a1c665049eeaa717ee681666c8b63c6d54e66df86144f85d80dcaa3ae7a13b58d5f2b607029efbbf8593afc75e0ce0a875a5fbedecb425a22624a0bb8e2fd06212a1fdafb92430d309f8f68504484fb1246f3d7b0893d3dc9d0b6c8d7476b6aea871eb4f32c283e22435fccb221484409cc28a6609dd869b99547fc81b2e517809a5b77783f9fc11b5fe584b9f64c0fec35d3db21ae30d0b8b88d722dea4a376d2a610f0a9d08b311e2ed3ef5d72d0e040e41d3dc45e5a17d740c67db88d95b18c8610fed3302aef0c3c1871ff8a5ae1908bf9668f0bc8e5867f56cc59cd303bafabde6a4034a96ba66b98a910dfaaff712673dcbf84c5354f066126068de620f08be67e6034138dd9a312f9ff197fca56a77bad46e59edfd79dfa3aee4582bfe01ce2201f6569178be7a4bdd28e495114944e538ee7b8f11e0812d9f822cd9760316809eccb9b0bbc5f0630224a1534f88600bbb2af2882562e76d149b44780380b62241829e5734fdfff1a2b3a052f3504dffe04d4632e9fef82762fe1950fbaceeb961464dfe2699f0a898fc8783cfdde45ecc3a16f052c4777beb1fddb080fc802a8cc760d1a0d4606b669e78ee9ba1ac398914ed5096850dedc513e5c71eca19d51af9075151f4ca3d8a841b7b1d205f5f3d223f7e48685daa0836f93017935ad1d942c7392667145ccc1d4700f5d8fb2fc218fd6d70357667d339a28dba3360761857b19f9f91e56a0e0281af1042a409a4e2839f3d21b73a5c352b22e4ff06e563e92c00b48e7f8bcdbbbd398c65331298f779dafe875854e301394b0faac2126138908fa8598b4f5e58ed1ac451eb0187e20077099d12d745fcff0b7fb5e8b9fa65ac617ea6c953e8786229b67a604c46810876650f919e6bc6792db22ec0be29cff94e9c24eb6e1830f890bb4b6bcd74b39060506095b99b95f2a8addfb8dfe11f47479fd23cc7c0701ae00774c430b3b9f52ab2579d47a2c2095365aa569f55a1431f93e651c01f0d67ff9337708a72e352c0e699f14bf07f9b9c056897c78edcf34ade3dfd17a04446d565fb6e7c701a237fe1a3d932371654a43b56e7f5ccdadc0f506d746c3f0047b69c0c174cbbfe092f139c09c0e2e76d9a777142813cb78174630ea8d73301e3343b94856fe610777468a9fb4518a0cf68243a4bd715e38e3431a811f962edb1306d76d89e0aad9be5800e7bebb82ccaec2382c9c114c91aee013acca2d8ddf99465e760bd185453a9eb4e5a78383094603b749c6242ad227124ef4b7ec7506b8a76f714099c954f0b2f2d427af0451a7ea3d1dbfa8a3e644c3640d397de3ce942311deb73fad3a76cba773f416314e81e70bda715b342113a18a249300b43250cb3b3aa46ecabe42d0e8c1dc4be286e539c71f0d1c0b0e1795ae7428a3887f36b79e9c76401a5dd460f45b9d8277e04c7c1e615fb33d0fbc444421f3fd0bff4e045d790610aaa2b62945e4b398024c75680b5e12235c35f5b23ddd99454fe527acad6d08fb37c35d9ecc0a8b10e2c31fac786666eb2ad499ddb7d06c7526fb1c5412f6a0df003410e69b81fe523057b6b73cdecf0e5bc4d3b87757889fe49dbdb3ec79c7eb3a868480fc87528e80400de837cccd4a6345508386ada1833f57a20c56e973569bc7821088d343e80009b7b35390975323d24e764aa6c90d3dd5fdec08ed363dc9ab57de949282994cd3858f829c7e5e9a745261383db27c9c53e9e98e109fda6cbb88649ba40b5067470d73b7471d406e5ea8041f9fa25f5b6c919aef84f7595511141e9f090ee103b20a13b22c9a88348ed6d284c0d7a58326e0c4c9626d9a5390bae2be199b201ea136a9aac76e6125db9bf58f61e6a46f8145a9df1305415989435f51529da03f09a67e3629e6f6cb6b70407d9d848f554f1a7e63602e678e62d3b41b4bf4ddda713ed2c291536d8cc12a16bde144ef56acc17778b1aa8eeeeeb60c781365b615be4435c7158d926351cdb46b89fa82acb384c7318dcb2e51db8bdb223aff2c8f36d9e6b1135ad18f7e0b9d91a76972c3140f8e21dc71422de12a4f5d08624bdaeb983619a5ff82cf788c6b8a5fbf0f78e61ae4058d6e03a3d5130646dfc13686e356a1325434caac94ced659529181561fee7ce4f7e1e7945f119ad8474ea6b00257ceb7af2d9b3f9ad5782cd986f1b097d61bf26a6c48c3ab597e4678d609f3050eec9f3bbea1bc67314407521950526e6d71e34e35392067ac84b66badc82a54bb0dc8ed2f1050711ef2d47af5252075c0441aad6900539fcc649c1b1ffc70a1cc39e0c2136c764ba718d50f4800dc29769c4bc9a2fd0f43eb6ffb717a473ccb14ccd58bd506c4e4a0f4ea1158b59b3d6bf1a2d010c456c1f099bff69add46cc60fd2d9779f603ebb943ab8eb02627ac8aebdd52f25b069f64a61e90fa9ac979cb4c6cf0ebcd070099a1a6e6a747e8989e84afe090390953f988f2dcee405086ce51b1d2d8d249f45899b4e862008d28efad8aa5abd0912fa456aa9d3a918a0dd3420d7c4b04b9e3d65c41a1548b7caeef5fbcededf64697786a0bae73d2c5352658b871c806bd150c91bbf8f4735dddee9cfd3e152b5d44cbcce912a2809760e225b9018fa498c86ccb2359cb0834bcefab92c0468522648fbefbe25cf8d82b897371b5369e8f2972502574c0a3235066969c4d5d67fc312d6631702f66a113d22063ba2ac7d9ab387ad1e115e9c98275f3e0dacd2e8f0843f24687b297bf42bca11b89c6db2fc7026d364486ef2d614bc45d5cff0758d69fd48ea06b8a97667e4d7d30bf7f1c30b62287637f50468bf144fd177fdabcbd0d12b50c9cbd052dcd66993c72f48bd6086412ed5f9af3d44dffdf7c012aadd5cf7bd3b314f236660fa1c0e4773a4e9ccc36fd130ffda59a9bf41f7fbf79e5e3333365a3ed2e7714e50805bc70bc6fd20203cacbbeecb8e01a2ce626756cdbd01c53717c2e7b56b47e21f13209c2bf2b1b251e7a93f8a085dcc61d9ae82303a962441372ff7c0b8b8ba75bbf5b861ff7ddbc9781d40c90ae467bdeddfdf949e9a8b8c9fb7db3a9323d05d15bef19ce2e7634b84ac082d50e84b66f99f34b2f852fefe67faa403e848f3de110eb1d9faefa176c3cacd20c7f87d74e858a1a7bfc2c9e895541f691f99a2b8771c8755300ee74e3d6a048b30d02ca16202ecfc207a0b29302aabc1c5b57c7d0d31d43be5cb1f7230dc238fb701e7037aa00c9b57c6fc85baccaa56754d27b975872051566187b0983d93b9ec052edf3b33f7ddab343eac6f7aed97771e708e40a4cc6797f85d91a0debd5c6169895e895f67a10685af5e0b80b0e728731cbffbff8be603469d03bd47dbca4456108c79c029af16482c5c2590c1e0673c7e943699ea107d906a3e667fe7b2afaeb489548b6a11d9862e86a0b549a42b607ffeda6e3ba0f567b63b0be6edb9098cf3a44e6864c5e99fa5f475acb57e2b7343eb7fe3e8c139b515348b188defd2d3021fd27950d822f6df5f9c93584fd95f3f88c85231943ed4d511249f96447f7903779e4d8c4a680661fe5133d415b862e668441e8077bfb827293a9eb733e914f37a19e01ad4b014ef87ed5a5817ab8123af9fd863090b8e9a50ce29cf706b2182fd79660cbdbb53ba71b750e71a21d0ed01db3335cad91d5cb4d4648f46468b6e51f63e4088386913ae6b6cbf103947c32d25a8a825118cd6ce23f53ffe3c087114700e9a5932faf3d844fc6b323b3e722ed3ed75037bd9a7fd9d256b2b9a168e66802e284853a0d6b47d39675900f02f005050425731f9c2cb329f70d7a5ce2ee256212bf8b2ba9ece0df39c58f0fbac06c4da946787abf19dadb536bddbf7e51d89f22413575e064c6482d936a89d48be159aeb5055feb0577ced6c5334411d1d58a7e6d02eca6164d90fda39685fd619269fea7f21db51f6aa6961250e03c9e00788c178dabeb68f13dea29f8cdcf30478dbca15c4519bb342ba8b201019061bf8317022dbc5673fb4ed92ef1a1dea0a1a00cb3cbca291f7ebcbec27ea5e824f04b82f5644d4368cdf8026550bc2f86b83da6a265357eb548a9eec6622204b3dcd22440fec0e12819ade4ba53b53b1e6ab906fe0cacabb9c15e8b657475a0dad62dbcb1037aa8617787abce24a0aa4cf1b5c85c030a14277832a95d8b29a4ea86fb80148ece147ce4bf386995ac28e1ad1e2072f3f4fce5c05d9bdd0af118815d6ee89aabfa3f8173e6fa59dfa4a8c1ba7641291b3c18c6ccc4c3588d56d169d397facb4e67485610cc68197b3a43fe78b9458dc47e5057d5bc6b8e3b65bf414818b65d41ed7cfd7a35fe79c9851ef39c3e059fb3dffe331a791ce75728efcd58dd9b3ed1c93b128469afa648f4f91de6e39d5bef7a0e69bdf5b2202682d857847a64b33432ea0f33bbfd1948ad0b6c66d853fef1e6c0d712b86c40f79ff4d125baebf2a4b32dfc8bed2a697f745cfeb16303b4f8e866ee0bb6a5eb6c6ce513b5cb84e2b44854c72ed0cf2e838245be8d098a6943d845f5a8c07c1036da86cab0d5be4ce29545fade4323acf2085b7645107dd12d5b3af7bb37be1b291cbd6fe297c4b4a2a23280358711be91f21305c035bf1f57467a1853c999b3fb478b11c49cfac66429a76099633a54689047d66fd8bd6eebea94fc8007d9e2765e2969608a78d0b96d6b30360e81fb9df5262c8ff15f2fd7000756d8cda1db3847d6f793bf803b159344c57b480c87702cb3d1260692a19ebdceb2e05a2fe2eb5ac5cfa76551a04795915bfaba9849a623e46ac1832157d0ea5255b5cacd4efa844b0ce5f2f0e1a9dc4fb115fce2640ec6d03c5fe15b4837bd6e6127349f2b6b0fd61c82c96531714f5b623ce4e4978c4a0c86b3c17f50acdd67d283ec934ed36ba7360a10ffeeb7864113eeaa25cccc66613e0757782381614b8da3cd0a85cef7bc384969517c920e8454a5a0f112d1653b2828e895d0614e5bf4dec0ec863432cce9337ce7c29affa7f29fff97bd54a6947cc68df8fed17850209242c1c67d0d7aced2efec4b3c006678bcb8716e8e9e40d78781fd6cc5b5522b8ed2ec8cecb677849b778c0a2a17817a3dd2278080e109906dd4e99b772d5911893fa09ade4296876921d1e009e714df7e4973ab1d2e593d88ecf2151e97ec66176549d3af66652c8377e162454ce7cc8ab34397d31978e84aea92a3c0a8106a2a31e33a8dfe942819fa1f2c1272d0f3cbd7dae820642cbc00202455ab7fb81857ef050a1965a291001874b38397ed9a8e8106dcfcdfd80d0f5d0ef0d5775e53cc5aeb1d6bc13886f8f3491cd6af5dd77ace3689fa2bf56e9b4d1e4964f8fd8f0a4a8b5d7fb678f0f3adcb4a19b5168ac5aeee6f087af15af3bde52a9be0f550b21b10ce98da70445284d9db9416732e63b6efb3ced984c0df50c11aa677f822af7ad39b8b4c0d236e4b36a00ff73587b39f917d7effbb37b95a96e350a430d544d68623c80bf2cd2d689b4dc41e8ef374c393092a2619055f268fbdcb9de494e6582be90a4798bac801bcac8389c823759860e7c9d692f41ee2a6b9624da3c09a2c8e7cdeaa100ba8ca25a737046d8bb237b9546641cfbb2eac9bbee9e125b14dfabac642e634d32151c06ceb3ddbb3d3f038ab2efdd063152270449ed5eca2655cd0016147ebbd00003eb8cd25297350afbffae43cfd9867543b81da4510850b1afaa199d0477837017e9098bf5b3973efe218a88b3d2bb172fe77278088997758fdc1dbb0b1fb6af2ab9db1ddf3e3fbd8e8dd35f918779ccba75b3cdfa317fc6e3cbeaa8b11ce2a30cc53292bcb9dc2a18ca400c674360c041c97ee6aec1448a025c6b04ae9efb3a01d31e3f897cfd5dc94dac95c88b95a26676cc6153e203535891116a5f4ebf54c71cbbe3215a04c57c7ba874a1e203bc66d8161d5b556f661244d9d405a2e6baaedd0d0e4c7e093c2ac0e5ee83b7ddf91669dd59016f7cb53d19896fcc838dc008da4a5fdc0a4fac1a6d7f49b24bcc01467df04d8a3f3181cc4e811942a53daf784b59186a17756a8f3a41ad93035a893a4ff60dd8f54a533e94cf87864169287804df3aa38dc5ce6021a06c58d48985c562a0f51d8b32879f9fb7d4a1d3d442626810f151b161b7e35f9a0b3bec05979e381140f31c03ee6f5549e6e7f116be5e87e0a9ab71ee632f837e9a0f9ad1b4979304c26bad6e84eff0b5b79b667e3d74e354d04f5b2c237102e41a1a4dcac99cbb911d9484aebe6ab2cb539a1db3e3302fb833a44a2d725e858ea9a65d43bb7661842b655c51a1ff25207956e8c6c71667c79975d69f688dfa34c59771488028e3d7500ba0cb71ae5751a51b568e67bdf2abb63838aba5e5cfbbeaf02285f6cbe58428a92a6fc25abb01f8d55ecbd7cc0ea69cdfb188b79048dbea488493681b0e70234463ca3e425d24e2ae4d800ce3adb04ce69428b5f884f8dc83392c22e456a2e195b86d717ac45003a99ae9a59c94167eb04aba3612528f94dad3360b46bc456fbb78072eb7f96418c71bec09831b0a63e83816ffde0d9909c06e765a666c2c41b20c339e0d39107311830ae9ad912f0a85f2ec5ca66a79798a568dae14f76b6d59e6c0bc0f9ebdff29c0fce58367c9705bd4323d3c3e125cdb13da6e58f3fdb2751401014e393e3fc688f04080a90430e531767a7c4f3187ccb7b90880955e766aba6091c4e8fed36482bb5a63372350dd08fe84bf5afd1a30a0f8f4de7a640fa84b9c0447073a0b39bf875d0377c8a572adefec3e033fb3dad91b22bfe22c01f23f27ab0c6a1ce19d2f4f4235281cbca15dafe50f383ba89a8c46a666b106c1ac534955df71f4c560010934fd3eb68eebd55487defa1e024f75ac30139cd190bde1dc8684936bc23a1882ae469fc4af8730d29658f996f71c219526497918e359228b55849d952f4b2996fe5f45a6cfdf87da93bfada579479b18d05c4e964c85b88a7bfc6e4f2b5d6e98e00635e8bd2ebb9eb40b99a9e9db2f688b2d94b8cc8c5fb2a1928624fa5df1c228e6499d992453772084bcd33dda984d97e3857b6fee43c6666b3206ccfe3af52debea4ee060c6edd194b90309213f5c4805f454c7e57bc759377aae9727e484391486be0849c5cdfa99c5a0d0687d6afdce97a32e01d45fef015e7c869ca190219a778b91d881a7b595313fb462e5bf78260c78285d6ccf5e4c50ed56ff28e3f49912773f0a58093f259b5cf4e7f607c51a81576fa95b97bf32d0e2e3511b5d784eba29a15246a97ccf608db456cd70adacc6c31913416f24f38dec3544ac2e88c409b5ff7771d873ea8d7a1868775c8b5502273c784cf945680fb14f143140b56462cd46874ffeacde7bf329fe8369df9c4b95a42535ea56ad6fa260f5c738eb9627f890f4a34f80bf3b8fe568d44c3895029b5f9557f17469a53fe4c0d581eb29029ff162ca906cd0e4bb81138be91a254752bf849232ed7042a82cda1e14dfbfdf74a09c17a9039749c789ab0242ed2d0249231c4ad70c23c805676968bdeb96c2d8886f784ecc3e42e6493e45aa20b6e8ede65c49136c9e9414a4371e3012bf596d55315be17ea9396b1df7f82db27f0d121f8aa66c40365fa686a46f430b4cd336da0d9937d5c26284bdcc6c4e0d5a6acc1be089e1a5d6ec422ad3961fb5c5c9836466c3366e6d3f2686b19b529549cacb6252b0d7a7f5df42ea2961ac59ba0b911311ccc4d83f8611f0c4b071544236037b2863d673303a4e3d428131b07f60eb2cd507dc43503456ce829aed8254bf0b51b38008d42e445acb0effc2ab7e4bc26ad76ffba1220f2e878fe9b5de39bf4f25a9ed468cdb100008ffac6bef401df4817b23463e771a3c834c32993274689c01004eb94b89bc44257b7d2b3936caab6d86937b5bb8f705d00fb6f091711222b6dc25eeaa0e350fe484337396162c86bf7d3a1ab82591ad35d393664617041142c0f8b528e947c092f28c3142493d056bd548910615e7300f041f5d01a2f00138ae5d7849244ef9215f5c9dd874e60ca4ad883f86e71690a510831e35c24de1e0d1261172bf4a8625af958febb7b109c5ca5bfffd4342c43ad02136c6eb117b4a6ea98c07a91279731c1228b01e6be755c1c1d095d3cdfe950ac32eee77327a0e7e342ccfc13c69ab6ab113b18c1abe72d39c03e351986cb3326b8b17ada5884aa7d0a553b0d35e32b8c09f1a4106f5d675a88a1508de4a0e9c598c082ae5b229b75579e39e297b225a852e3f6a7d0990a45fdf68771991acf9b7a5c04bc21a40c57817d500e8ebc6b5919219a4110395817c92bf9eb9c623606d4d98ed68dc0b51a0278b0addce8753f86316158bb4bd6a7a0c4c72b0d17b9545695e54826021a6ac44b4de1b4ea977b20af3c47b8860b0ed29a68c1a883777097d54b162cc58edc0f4de1afbbad7c340a5cd9f2f93133cb2a4babc2a688e2ddd580ef8d9d0846c269c265ce9d978aa233c73aa11eb78d3a67f4e7a3dd035ef5a1f832ada87c7dfa377b77215f8c23b1a78e4a7faa6d0c1a4a28a0ef7b32b36bd566d8c478d0133ab43f9c2a4829624eec535234eb89a177ca8d4e9d2d422f33a24d15044822e4a4c1bca5f470b8c8fde09fb69160297218398da27f4e80dbd480782ee75cecd20ad23fdbcc1d4a0acbc63241c1e2cf1a0b12949e42f707ba06b6fdbd8f336bd72d7f96ddf9ec2b5cfcc4c8da6e1ea573e97eeaea537511ac9fd2ae78eb18cb50c13b595f8b6d65ce8c08e9028fffff6b512080dbbd3fb5e5068538c05f73254969f9727db9bff0c6aeaaf83713812499308792a7fc8318e6b2996bcd1b072641be1eb8e028cbd6b0a5f1fa13bfe35b5cd0d2ca21d9cf8ed97f724ef73ab5a99d65befa38d636f2f827d229479377f25501f3a6ece12cb095549503b2299db7806d32751d4851d62b0c6a91e2e961d475d33a8874c96df52c75bb5a0569e892743937451f75345e0351bfa334d37aa43f01ad1ff984dec164faebc713de31470db5e536a0681a042ced0f9839d9ce89259349075961985171c27c410c99458d4c25614ea1d4252293c4f85b0d2ded9ac560cfd024c199d5f0f4bd47763690ba1bca88b8cc81059bb9fe82c955488523114db8c2caf8a63c0049e90ca524330b57edcf718f6a7aab0efe282079d198cc3c1294f35d1a1bf5f69a8838cfc5d4363f9ca9383f83e4f9576de3fac48866ddcde282e5e4ee3f852a063bd6423ac1fdc6201b1facd6c36609fa2faf96afc1c0b76fff27bce059ad6390fd1e3f735806ce654ed555a78ea8e59fb16ff5ac5ad183aab9de37c3d033b3018d591e7ff1a896de969f561260f797603df5fc232076ccdc2e1fe9fc789253a54af151dd50f89e777c2541591101720c893647bd4b3e6257de85251c9bcd700154e85db2a9e2c4d9d2e531a18bfaa05d16ce75f823e60416b3afebce16555536120d5f554fd13e861d74c4947a62d2d09473d8d75f03d354572b371b02e16f3976b1b0b235582ee38d938fe843b107c77c2acd88f34e1669816eb3867134b1c5fce5afad3c70f9bca972ed494577f2ba6362a6ee6b4720bd86938bb49490982a1b5ce6dd54b79f093ce27051530e1233f03d6641392d4fe7a1f7dcec8ba86d8f32f00f0ad50a29b1e17de07bd0205c0d893532c198f23656f7f5d178c0745b7e0b7e8afdd29c8fa1639a06039980d9a5fba11801db4e7868a9b77925a03a770aae3430b1ccbddb8bd766f51fef71ba25cf9184c9cfa6f9921d69066d09a656080f3c5fe475ccab94cdfccd76f3c7dada9236d1be861eb5fe6247ae9f97b7705bb71c375e8b98203c5bd224202c1aa714da47e0daf98fd3eca617f9a255df5dbe98a7520a1e6db9b88af893521f2ecf7fd2b08a7f3c5aeb77ebe6f52739b473840889c41315407477b82242d9a805f9aa200a129c4701d1c88ccd34871f356caf02da9937a88612a9755315914f4e8e1bf471a46c00650457cc06db168e5457fb3f9662994d901a1f58306156979aa795afacc1a7d6111cbea53e97fb71c7bbe44558fb06f8d78ee08e3678b5d218e13f79cf06f1da9f7e128647884589c487147b3edbdaffa16f9388568d3c8caa34a6b944e4f171842cdbb293474fcd5201b7440e05ddcf9e0b476773119516ef45077705e8bab5f877657205bf9eaaa7c86734b1b6c3661dfd4b9eb8590f962e17ad51b44058d558744e5b44cf9db280bff1062b2431d298064f11e7700ba4c8ece6f4df659d4880c4983db0152f1f903023672f6234620134bd5d1d888022da128a527d82e8fa1a562827a4f1592efe3b0bb78060626e8688ef3d5162afe9f1060123dbb1f93b7bdb6ad4ad6e1772bf8705cca424d9c42e4992eb5bef1ec7961bd4260d1e55e863fa9c8e0cb6d28b495fa37b5f59fd18cfcec6319288dd7363821e47ec46664e1994157319eb0d466b42fd9b5fac5ba979a9baf4f699dc539bf77852e18014074f88108b654219e4f9396696c94eb9fb9b360e59920f187029608bed76d09dd006f4033d384cd109726d51850202ba564599dbff7808591f834cc4084db29111de86a70217defa490e39c6e281650d15b1e44bb55164be0f6da58e838bf5f4d7cc2a23b818557ab1fad0fb2253c4da6af41591940b2608f6fa6bc25939ede95317ff96050bbc1f389235caa78adc0d801a56b2fb4cc41e73d5131552985b5af241722e0637f3b88e46b09ea875e5cf66f534666368ff8e46413e5ab557236134afa63478e18328d33b1a235deb2034955cdbb2bfd0e55fd885f380ae8efca1feea985a946519a712df1384f9e024efec61c30a6989aa3b5bd486366f3fccadc0add175c1cf0d2730ab97370eb47bcda4226ee140edbcd9b38b8ee913587125cb185adb4df18e80df2b0ea6e3e87dc8755fe6823ab5ee1feaebb1e6208cf3dd5ad5581f2388be92", 0x2000, &(0x7f0000004dc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002280)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f00000046c0)={0x50, 0x0, r1, {0x7, 0x9, 0x0, 0x403a1810, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100}}, 0x50) llistxattr(&(0x7f0000002300)='./file0\x00', 0x0, 0x500) 3.163540689s ago: executing program 7 (id=1162): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl2\x00', r2, 0x0, 0xfd, 0x4, 0x3, 0x5, @mcast2, @loopback={0x0, 0x460c6}, 0x40, 0x8, 0x804, 0x23e}}) 1.805082108s ago: executing program 8 (id=1163): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000e40)=ANY=[@ANYBLOB="500000000301050000000000000000000a0000003c0002802c000180140003"], 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) 0s ago: executing program 8 (id=1164): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f00000001c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffd}, 0x39) kernel console output (not intermixed with test programs): 54.130:742): avc: denied { execmem } for pid=5702 comm="syz.6.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1361.665102][ T30] audit: type=1400 audit(1361.030:743): avc: denied { write } for pid=5712 comm="syz.7.518" name="mcfilter" dev="proc" ino=4026532771 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1370.955905][ T30] audit: type=1400 audit(1370.340:744): avc: denied { create } for pid=5734 comm="syz.7.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1371.040750][ T30] audit: type=1400 audit(1370.420:745): avc: denied { bind } for pid=5734 comm="syz.7.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1371.051379][ T30] audit: type=1400 audit(1370.440:746): avc: denied { name_bind } for pid=5734 comm="syz.7.524" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1371.099863][ T30] audit: type=1400 audit(1370.480:747): avc: denied { node_bind } for pid=5734 comm="syz.7.524" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1371.971329][ T30] audit: type=1400 audit(1371.340:748): avc: denied { setopt } for pid=5734 comm="syz.7.524" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1372.732105][ T30] audit: type=1400 audit(1372.110:749): avc: denied { write } for pid=5734 comm="syz.7.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1372.766996][ T30] audit: type=1400 audit(1372.150:750): avc: denied { read } for pid=5734 comm="syz.7.524" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1374.505610][ T30] audit: type=1400 audit(1373.880:751): avc: denied { create } for pid=5738 comm="syz.7.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1380.855934][ T30] audit: type=1326 audit(1380.230:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1380.883178][ T30] audit: type=1326 audit(1380.260:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1380.911253][ T30] audit: type=1326 audit(1380.290:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=92 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1380.920015][ T30] audit: type=1326 audit(1380.300:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1381.017357][ T30] audit: type=1326 audit(1380.390:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=116 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1381.034962][ T30] audit: type=1326 audit(1380.420:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1381.072812][ T30] audit: type=1326 audit(1380.430:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1381.087846][ T30] audit: type=1326 audit(1380.470:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1381.241753][ T30] audit: type=1326 audit(1380.630:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1381.311283][ T30] audit: type=1326 audit(1380.670:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5742 comm="syz.7.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1388.210420][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 1388.215063][ T30] audit: type=1400 audit(1387.590:782): avc: denied { read write } for pid=5769 comm="syz.6.535" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1388.223785][ T30] audit: type=1400 audit(1387.590:783): avc: denied { open } for pid=5769 comm="syz.6.535" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1389.937684][ T30] audit: type=1400 audit(1389.320:784): avc: denied { create } for pid=5773 comm="syz.6.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1390.073648][ T30] audit: type=1400 audit(1389.460:785): avc: denied { ioctl } for pid=5773 comm="syz.6.536" path="socket:[12097]" dev="sockfs" ino=12097 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1390.104323][ T30] audit: type=1400 audit(1389.490:786): avc: denied { bind } for pid=5773 comm="syz.6.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1393.399842][ T30] audit: type=1400 audit(1392.780:787): avc: denied { name_bind } for pid=5779 comm="syz.6.538" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1393.403777][ T30] audit: type=1400 audit(1392.780:788): avc: denied { node_bind } for pid=5779 comm="syz.6.538" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1394.486721][ T30] audit: type=1400 audit(1393.870:789): avc: denied { create } for pid=5781 comm="syz.7.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1394.505169][ T30] audit: type=1400 audit(1393.890:790): avc: denied { write } for pid=5781 comm="syz.7.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1425.133248][ T30] audit: type=1400 audit(1424.490:791): avc: denied { setopt } for pid=5808 comm="syz.7.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1425.229635][ T30] audit: type=1400 audit(1424.610:792): avc: denied { ioctl } for pid=5808 comm="syz.7.546" path="socket:[12138]" dev="sockfs" ino=12138 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1425.269993][ T30] audit: type=1400 audit(1424.620:793): avc: denied { write } for pid=5808 comm="syz.7.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1427.381598][ T5814] netlink: 'syz.7.548': attribute type 4 has an invalid length. [ 1427.977468][ T5814] netlink: 'syz.7.548': attribute type 4 has an invalid length. [ 1432.927497][ T30] audit: type=1400 audit(1432.290:794): avc: denied { create } for pid=5815 comm="syz.6.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1433.011804][ T30] audit: type=1400 audit(1432.300:795): avc: denied { bind } for pid=5815 comm="syz.6.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1433.027650][ T30] audit: type=1400 audit(1432.300:796): avc: denied { listen } for pid=5815 comm="syz.6.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1433.040503][ T30] audit: type=1400 audit(1432.310:797): avc: denied { connect } for pid=5815 comm="syz.6.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1433.121947][ T30] audit: type=1400 audit(1432.510:798): avc: denied { write } for pid=5815 comm="syz.6.549" path="socket:[10929]" dev="sockfs" ino=10929 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1433.257062][ T30] audit: type=1400 audit(1432.520:799): avc: denied { accept } for pid=5815 comm="syz.6.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1435.142093][ T30] audit: type=1326 audit(1434.490:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.7.550" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x0 [ 1440.282364][ T30] audit: type=1400 audit(1439.660:801): avc: denied { write } for pid=5827 comm="syz.7.551" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1440.446357][ T30] audit: type=1400 audit(1439.820:802): avc: denied { ioctl } for pid=5827 comm="syz.7.551" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1444.241987][ T30] audit: type=1400 audit(1443.600:803): avc: denied { mount } for pid=5836 comm="syz.6.554" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1445.365562][ T30] audit: type=1400 audit(1444.750:804): avc: denied { nlmsg_write } for pid=5838 comm="syz.7.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1445.723925][ T30] audit: type=1400 audit(1445.100:805): avc: denied { audit_write } for pid=5838 comm="syz.7.555" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1445.780948][ T30] audit: type=1107 audit(1445.130:806): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 1456.566121][ T30] audit: type=1400 audit(1455.530:807): avc: denied { remount } for pid=5848 comm="syz.6.558" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1463.047481][ T30] audit: type=1400 audit(1462.420:808): avc: denied { write } for pid=5862 comm="syz.7.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1465.147378][ T30] audit: type=1326 audit(1464.530:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5867 comm="syz.6.562" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1465.205888][ T30] audit: type=1326 audit(1464.590:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5867 comm="syz.6.562" exe="/syz-executor" sig=0 arch=c00000b7 syscall=149 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1465.210374][ T30] audit: type=1326 audit(1464.590:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5867 comm="syz.6.562" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1485.505389][ T5881] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1485.506354][ T5881] netdevsim netdevsim6 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1485.507398][ T5881] netdevsim netdevsim6 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1485.507771][ T5881] netdevsim netdevsim6 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1493.186348][ T30] audit: type=1400 audit(2000000023.050:812): avc: denied { create } for pid=5891 comm="syz.6.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1514.280166][ T30] audit: type=1400 audit(2000000043.380:813): avc: denied { ioctl } for pid=5911 comm="syz.7.573" path="socket:[12286]" dev="sockfs" ino=12286 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1522.760559][ T30] audit: type=1400 audit(2000000052.620:814): avc: denied { create } for pid=5916 comm="syz.7.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1532.643773][ T30] audit: type=1326 audit(2000000062.510:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1532.644461][ T30] audit: type=1326 audit(2000000062.510:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1532.700993][ T30] audit: type=1326 audit(2000000062.530:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1532.720229][ T30] audit: type=1326 audit(2000000062.580:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1532.774072][ T30] audit: type=1326 audit(2000000062.610:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1532.921899][ T30] audit: type=1326 audit(2000000062.770:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1532.934128][ T30] audit: type=1326 audit(2000000062.800:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1532.969271][ T30] audit: type=1326 audit(2000000062.820:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1533.009165][ T30] audit: type=1326 audit(2000000062.860:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1533.036724][ T30] audit: type=1326 audit(2000000062.890:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.7.576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1537.852316][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1537.864869][ T30] audit: type=1400 audit(2000000067.700:829): avc: denied { lock } for pid=5930 comm="syz.7.577" path="socket:[11077]" dev="sockfs" ino=11077 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1559.762407][ T30] audit: type=1400 audit(2000000089.620:830): avc: denied { read write } for pid=5984 comm="syz.6.591" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1559.769802][ T30] audit: type=1400 audit(2000000089.620:831): avc: denied { open } for pid=5984 comm="syz.6.591" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1559.787801][ T30] audit: type=1400 audit(2000000089.650:832): avc: denied { ioctl } for pid=5984 comm="syz.6.591" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1573.093310][ T6005] netlink: 44 bytes leftover after parsing attributes in process `syz.6.594'. [ 1573.103581][ T6005] netlink: 4 bytes leftover after parsing attributes in process `syz.6.594'. [ 1575.359273][ T30] audit: type=1400 audit(2000000105.210:833): avc: denied { setopt } for pid=6009 comm="syz.6.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1583.793884][ T30] audit: type=1400 audit(2000000113.660:834): avc: denied { mounton } for pid=6022 comm="syz.6.599" path="/71/file0" dev="tmpfs" ino=377 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1584.032295][ T30] audit: type=1400 audit(2000000113.880:835): avc: denied { mount } for pid=6022 comm="syz.6.599" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1591.297382][ T30] audit: type=1400 audit(2000000121.160:836): avc: denied { setopt } for pid=6033 comm="syz.7.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1592.080207][ T30] audit: type=1400 audit(2000000121.940:837): avc: denied { shutdown } for pid=6033 comm="syz.7.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1598.201591][ T30] audit: type=1400 audit(2000000128.050:838): avc: denied { unmount } for pid=5169 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1599.463200][ T30] audit: type=1400 audit(2000000129.300:839): avc: denied { name_bind } for pid=6042 comm="syz.6.602" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1614.991620][ T30] audit: type=1400 audit(2000000144.850:840): avc: denied { mount } for pid=6057 comm="syz.7.607" name="/" dev="ramfs" ino=11212 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1616.607284][ T30] audit: type=1400 audit(2000000146.470:841): avc: denied { mounton } for pid=6065 comm="syz.6.611" path="/78/file0" dev="tmpfs" ino=413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1616.763096][ T30] audit: type=1400 audit(2000000146.630:842): avc: denied { read write } for pid=6067 comm="syz.7.612" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1616.768716][ T30] audit: type=1400 audit(2000000146.630:843): avc: denied { open } for pid=6067 comm="syz.7.612" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1619.962264][ T30] audit: type=1400 audit(2000000149.820:844): avc: denied { read write } for pid=6076 comm="syz.6.615" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1619.967705][ T30] audit: type=1400 audit(2000000149.820:845): avc: denied { open } for pid=6076 comm="syz.6.615" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1619.976958][ T30] audit: type=1400 audit(2000000149.840:846): avc: denied { ioctl } for pid=6076 comm="syz.6.615" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1619.995373][ T6077] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1620.066876][ T6077] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1620.439559][ T30] audit: type=1400 audit(2000000150.300:847): avc: denied { read write } for pid=6078 comm="syz.7.616" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1620.462905][ T30] audit: type=1400 audit(2000000150.330:848): avc: denied { open } for pid=6078 comm="syz.7.616" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1620.619626][ T30] audit: type=1400 audit(2000000150.480:849): avc: denied { ioctl } for pid=6078 comm="syz.7.616" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1620.762695][ T6079] input: syz0 as /devices/virtual/input/input3 [ 1621.930328][ T6085] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1621.934486][ T6085] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1622.456916][ T30] audit: type=1326 audit(2000000152.320:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6086 comm="syz.7.620" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1622.467484][ T30] audit: type=1326 audit(2000000152.320:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6086 comm="syz.7.620" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1622.487167][ T30] audit: type=1326 audit(2000000152.350:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6086 comm="syz.7.620" exe="/syz-executor" sig=0 arch=c00000b7 syscall=112 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1622.637040][ T30] audit: type=1326 audit(2000000000.000:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6086 comm="syz.7.620" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1622.662539][ T30] audit: type=1326 audit(2000000000.140:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6086 comm="syz.7.620" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1622.766177][ T30] audit: type=1326 audit(2000000000.270:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.6.621" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1622.772682][ T30] audit: type=1326 audit(2000000000.270:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.6.621" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1627.645726][ T6099] SELinux: Context '8z@«ü is not valid (left unmapped). [ 1627.697718][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1627.725381][ T30] audit: type=1400 audit(2000000005.060:865): avc: denied { mac_admin } for pid=6097 comm="syz.6.626" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1629.611554][ T30] audit: type=1326 audit(2000000007.110:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.6.627" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1629.661100][ T30] audit: type=1326 audit(2000000007.160:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.6.627" exe="/syz-executor" sig=0 arch=c00000b7 syscall=130 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1629.662415][ T30] audit: type=1326 audit(2000000007.160:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.6.627" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1629.673540][ T30] audit: type=1326 audit(2000000007.180:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.6.627" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1629.675916][ T30] audit: type=1326 audit(2000000007.180:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.6.627" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1641.437585][ T30] audit: type=1326 audit(2000000018.930:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6115 comm="syz.6.633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1641.461831][ T30] audit: type=1326 audit(2000000018.960:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6115 comm="syz.6.633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=176 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1641.463335][ T30] audit: type=1326 audit(2000000018.960:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6115 comm="syz.6.633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1641.643060][ T6118] netlink: 'syz.7.632': attribute type 27 has an invalid length. [ 1642.629730][ T30] audit: type=1400 audit(2000000020.120:874): avc: denied { sys_module } for pid=6113 comm="syz.7.632" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1648.951215][ T6130] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6130 comm=syz.6.638 [ 1650.223590][ T30] audit: type=1400 audit(2000000002.640:875): avc: denied { create } for pid=6131 comm="syz.6.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1655.113007][ T30] audit: type=1400 audit(2000000007.270:876): avc: denied { ioctl } for pid=6131 comm="syz.6.639" path="socket:[12619]" dev="sockfs" ino=12619 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1655.237838][ T30] audit: type=1400 audit(2000000007.450:877): avc: denied { write } for pid=6131 comm="syz.6.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1656.604654][ T6118] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1656.681490][ T6118] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1656.687288][ T6118] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1656.743371][ T6118] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1662.073692][ T6119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1663.617042][ T6119] veth1_vlan: left promiscuous mode [ 1663.686530][ T6119] veth0_vlan: left promiscuous mode [ 1663.762977][ T6119] veth0_vlan: entered promiscuous mode [ 1663.856474][ T6119] veth1_vlan: entered promiscuous mode [ 1664.055120][ T6119] veth1_macvtap: left promiscuous mode [ 1664.074192][ T6119] veth0_macvtap: left promiscuous mode [ 1664.123634][ T6119] veth0_macvtap: entered promiscuous mode [ 1664.164822][ T6119] veth1_macvtap: entered promiscuous mode [ 1664.260901][ T6119] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1664.262134][ T6119] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1664.262482][ T6119] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1664.262852][ T6119] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1668.011106][ T30] audit: type=1400 audit(2000000020.360:878): avc: denied { validate_trans } for pid=6140 comm="syz.7.642" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1669.552274][ T6143] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1669.557851][ T6143] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1683.387865][ T30] audit: type=1326 audit(2000000035.800:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.7.644" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1683.425950][ T30] audit: type=1326 audit(2000000035.840:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.7.644" exe="/syz-executor" sig=0 arch=c00000b7 syscall=108 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1683.481986][ T30] audit: type=1326 audit(2000000035.870:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.7.644" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1683.516112][ T30] audit: type=1326 audit(2000000035.920:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.7.644" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1703.009196][ T30] audit: type=1326 audit(2000000055.380:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6158 comm="syz.7.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1703.120067][ T30] audit: type=1326 audit(2000000055.520:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6158 comm="syz.7.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=149 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1703.162187][ T30] audit: type=1326 audit(2000000055.560:885): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6158 comm="syz.7.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1703.240347][ T30] audit: type=1326 audit(2000000055.640:886): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6158 comm="syz.7.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1705.849621][ T30] audit: type=1400 audit(2000000058.240:887): avc: denied { mount } for pid=6161 comm="syz.7.650" name="/" dev="configfs" ino=1120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1705.903884][ T30] audit: type=1400 audit(2000000058.320:888): avc: denied { search } for pid=6161 comm="syz.7.650" name="/" dev="configfs" ino=1120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1706.193350][ T30] audit: type=1404 audit(2000000058.610:889): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1706.651991][ T30] audit: type=1404 audit(2000000059.060:890): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1707.003541][ T30] audit: type=1400 audit(2000000059.420:891): avc: denied { map_create } for pid=6165 comm="syz.7.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1707.021307][ T30] audit: type=1400 audit(2000000059.420:892): avc: denied { bpf } for pid=6165 comm="syz.7.652" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1709.373760][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1709.381936][ T30] audit: type=1400 audit(2000000061.790:899): avc: denied { read } for pid=6171 comm="syz.6.656" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1709.386333][ T30] audit: type=1400 audit(2000000061.790:900): avc: denied { open } for pid=6171 comm="syz.6.656" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1709.514766][ T30] audit: type=1400 audit(2000000061.910:901): avc: denied { write } for pid=6171 comm="syz.6.656" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1710.074990][ T30] audit: type=1400 audit(2000000062.490:902): avc: denied { execmem } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1710.733633][ T30] audit: type=1400 audit(2000000063.140:903): avc: denied { ioctl } for pid=6171 comm="syz.6.656" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1714.550909][ T30] audit: type=1400 audit(2000000066.150:904): avc: denied { create } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1714.552462][ T30] audit: type=1400 audit(2000000066.170:905): avc: denied { setopt } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1714.581940][ T30] audit: type=1400 audit(2000000066.870:906): avc: denied { create } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1715.571053][ T30] audit: type=1400 audit(2000000066.940:907): avc: denied { connect } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1715.577870][ T30] audit: type=1400 audit(2000000067.050:908): avc: denied { prog_run } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1715.593575][ T30] audit: type=1400 audit(2000000067.070:909): avc: denied { setopt } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1715.594401][ T30] audit: type=1400 audit(2000000067.070:910): avc: denied { write } for pid=6173 comm="syz.7.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1723.384391][ T30] audit: type=1400 audit(2000000075.800:911): avc: denied { create } for pid=6181 comm="syz.6.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1724.905292][ T30] audit: type=1400 audit(2000000077.320:912): avc: denied { create } for pid=6186 comm="syz.7.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1724.980726][ T30] audit: type=1400 audit(2000000077.380:913): avc: denied { setopt } for pid=6186 comm="syz.7.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1725.035314][ T30] audit: type=1400 audit(2000000077.450:914): avc: denied { create } for pid=6186 comm="syz.7.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1725.100641][ T30] audit: type=1400 audit(2000000077.490:915): avc: denied { write } for pid=6186 comm="syz.7.660" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1727.153695][ T30] audit: type=1400 audit(2000000079.570:916): avc: denied { ioctl } for pid=6191 comm="syz.7.662" path="socket:[12747]" dev="sockfs" ino=12747 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1727.230024][ T30] audit: type=1400 audit(2000000079.630:917): avc: denied { module_request } for pid=6191 comm="syz.7.662" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1727.902250][ T30] audit: type=1400 audit(2000000080.280:918): avc: denied { sys_module } for pid=6191 comm="syz.7.662" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1730.291027][ T30] audit: type=1400 audit(2000000082.710:919): avc: denied { mounton } for pid=6198 comm="syz.7.664" path="/101/file0" dev="tmpfs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1730.303997][ T30] audit: type=1400 audit(2000000082.720:920): avc: denied { mount } for pid=6198 comm="syz.7.664" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1730.324181][ T30] audit: type=1400 audit(2000000082.740:921): avc: denied { remount } for pid=6198 comm="syz.7.664" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1730.347266][ T6199] devpts: Bad value for 'max' [ 1730.506996][ T30] audit: type=1400 audit(2000000082.920:922): avc: denied { unmount } for pid=5187 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1731.122802][ T30] audit: type=1326 audit(2000000083.540:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6200 comm="syz.7.665" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1731.146077][ T30] audit: type=1326 audit(2000000083.540:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6200 comm="syz.7.665" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1731.153862][ T30] audit: type=1326 audit(2000000083.560:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6200 comm="syz.7.665" exe="/syz-executor" sig=0 arch=c00000b7 syscall=136 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1731.159404][ T30] audit: type=1326 audit(2000000083.560:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6200 comm="syz.7.665" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1731.163272][ T30] audit: type=1326 audit(2000000083.560:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6200 comm="syz.7.665" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1733.260282][ T30] audit: type=1400 audit(2000000085.650:928): avc: denied { name_bind } for pid=6181 comm="syz.6.658" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1745.189674][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1745.190406][ T30] audit: type=1326 audit(2000000097.600:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6215 comm="syz.6.670" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x0 [ 1750.909085][ T30] audit: type=1400 audit(2000000103.290:931): avc: denied { read } for pid=6226 comm="syz.7.675" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1750.910491][ T30] audit: type=1400 audit(2000000103.300:932): avc: denied { open } for pid=6226 comm="syz.7.675" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1750.911136][ T30] audit: type=1400 audit(2000000103.320:933): avc: denied { ioctl } for pid=6226 comm="syz.7.675" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1751.366053][ T30] audit: type=1400 audit(2000000103.780:934): avc: denied { read } for pid=6228 comm="syz.6.676" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1751.432872][ T30] audit: type=1400 audit(2000000103.850:935): avc: denied { open } for pid=6228 comm="syz.6.676" path="net:[4026532626]" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1751.450285][ T30] audit: type=1400 audit(2000000103.860:936): avc: denied { create } for pid=6228 comm="syz.6.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1751.561635][ T30] audit: type=1400 audit(2000000103.980:937): avc: denied { write } for pid=6228 comm="syz.6.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1751.740883][ T30] audit: type=1404 audit(2000000104.150:938): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1751.958854][ T30] audit: type=1404 audit(2000000104.370:939): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1752.203650][ T30] audit: type=1400 audit(2000000104.620:940): avc: denied { read write } for pid=5169 comm="syz-executor" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1756.574746][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 1756.584840][ T30] audit: type=1400 audit(2000000108.990:956): avc: denied { map_create } for pid=6248 comm="syz.7.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1756.596780][ T30] audit: type=1400 audit(2000000109.000:957): avc: denied { map_read map_write } for pid=6248 comm="syz.7.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1756.709824][ T30] audit: type=1400 audit(2000000109.110:958): avc: denied { module_request } for pid=6248 comm="syz.7.685" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1757.700673][ T30] audit: type=1400 audit(2000000110.110:959): avc: denied { prog_run } for pid=6252 comm="syz.6.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1758.250769][ T30] audit: type=1400 audit(2000000110.650:960): avc: denied { ioctl } for pid=6254 comm="syz.7.687" path="socket:[12858]" dev="sockfs" ino=12858 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1758.880537][ T30] audit: type=1400 audit(2000000111.260:961): avc: denied { execmem } for pid=6256 comm="syz.6.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1765.156780][ T30] audit: type=1400 audit(2000000117.570:962): avc: denied { write } for pid=6265 comm="syz.7.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1765.240647][ T30] audit: type=1400 audit(2000000117.620:963): avc: denied { read } for pid=6265 comm="syz.7.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1784.129002][ T30] audit: type=1400 audit(2000000136.220:964): avc: denied { create } for pid=6273 comm="syz.6.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1784.299387][ T30] audit: type=1400 audit(2000000136.260:965): avc: denied { connect } for pid=6273 comm="syz.6.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1784.599265][ T30] audit: type=1400 audit(2000000136.320:966): avc: denied { create } for pid=6273 comm="syz.6.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1784.600587][ T30] audit: type=1400 audit(2000000136.370:967): avc: denied { setopt } for pid=6273 comm="syz.6.693" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1784.601321][ T30] audit: type=1400 audit(2000000136.430:968): avc: denied { write } for pid=6273 comm="syz.6.693" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1784.602015][ T30] audit: type=1400 audit(2000000136.470:969): avc: denied { read } for pid=6273 comm="syz.6.693" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1790.010097][ T30] audit: type=1400 audit(2000000142.360:970): avc: denied { create } for pid=6279 comm="syz.7.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1790.121719][ T30] audit: type=1400 audit(2000000142.540:971): avc: denied { write } for pid=6279 comm="syz.7.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1794.170744][ T30] audit: type=1326 audit(2000000146.580:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.7.698" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1794.179676][ T30] audit: type=1326 audit(2000000146.590:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.7.698" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1794.211289][ T30] audit: type=1326 audit(2000000146.610:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.7.698" exe="/syz-executor" sig=0 arch=c00000b7 syscall=7 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1794.212752][ T30] audit: type=1326 audit(2000000146.610:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.7.698" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1794.213347][ T30] audit: type=1326 audit(2000000146.620:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.7.698" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1795.000857][ T30] audit: type=1400 audit(2000000147.410:977): avc: denied { allowed } for pid=6288 comm="syz.6.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1795.041793][ T30] audit: type=1400 audit(2000000147.450:978): avc: denied { create } for pid=6288 comm="syz.6.699" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1795.070320][ T30] audit: type=1400 audit(2000000147.470:979): avc: denied { map } for pid=6288 comm="syz.6.699" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13593 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1795.109923][ T30] audit: type=1400 audit(2000000147.520:980): avc: denied { read write } for pid=6288 comm="syz.6.699" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13593 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1795.564767][ T30] audit: type=1400 audit(2000000147.980:981): avc: denied { name_bind } for pid=6290 comm="syz.7.700" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1798.195225][ T30] audit: type=1400 audit(2000000150.590:982): avc: denied { audit_write } for pid=6296 comm="syz.6.702" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1798.231563][ T30] audit: type=1107 audit(2000000150.640:983): pid=6296 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1799.461241][ T30] audit: type=1326 audit(2000000151.880:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6300 comm="syz.6.704" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1799.472866][ T30] audit: type=1326 audit(2000000151.880:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6300 comm="syz.6.704" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1799.516857][ T30] audit: type=1326 audit(2000000151.930:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6300 comm="syz.6.704" exe="/syz-executor" sig=0 arch=c00000b7 syscall=233 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1799.535713][ T30] audit: type=1326 audit(2000000151.950:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6300 comm="syz.6.704" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1800.057214][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1800.057799][ T30] audit: type=1400 audit(2000000152.450:990): avc: denied { write } for pid=6302 comm="syz.6.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1800.081834][ T30] audit: type=1400 audit(2000000152.500:991): avc: denied { nlmsg_write } for pid=6302 comm="syz.6.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1800.081968][ T6303] netlink: 72 bytes leftover after parsing attributes in process `syz.6.705'. [ 1808.641953][ T6308] IPv4: Oversized IP packet from 127.202.26.0 [ 1809.219557][ T30] audit: type=1400 audit(2000000161.630:992): avc: denied { getopt } for pid=6310 comm="syz.6.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1814.265025][ T6319] netlink: 'syz.6.710': attribute type 11 has an invalid length. [ 1814.265643][ T6319] netlink: 36 bytes leftover after parsing attributes in process `syz.6.710'. [ 1815.619945][ T30] audit: type=1400 audit(2000000168.030:993): avc: denied { write } for pid=6318 comm="syz.7.711" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1815.629833][ T30] audit: type=1400 audit(2000000168.040:994): avc: denied { open } for pid=6318 comm="syz.7.711" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1815.794270][ T30] audit: type=1400 audit(2000000168.200:995): avc: denied { ioctl } for pid=6318 comm="syz.7.711" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1824.234625][ T30] audit: type=1326 audit(2000000176.650:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.245074][ T30] audit: type=1326 audit(2000000176.650:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.246270][ T30] audit: type=1326 audit(2000000176.660:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.280536][ T30] audit: type=1326 audit(2000000176.680:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.399995][ T30] audit: type=1326 audit(2000000176.800:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.405442][ T30] audit: type=1326 audit(2000000176.820:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.417469][ T30] audit: type=1326 audit(2000000176.830:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.484293][ T30] audit: type=1326 audit(2000000176.890:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.566968][ T30] audit: type=1326 audit(2000000176.900:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=113 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1824.569709][ T30] audit: type=1326 audit(2000000176.980:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6328 comm="syz.6.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 1845.842635][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1845.843774][ T30] audit: type=1400 audit(2000000198.250:1007): avc: denied { read append } for pid=6351 comm="syz.7.725" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1846.016319][ T30] audit: type=1400 audit(2000000198.410:1008): avc: denied { open } for pid=6351 comm="syz.7.725" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1846.486136][ T30] audit: type=1400 audit(2000000198.860:1009): avc: denied { ioctl } for pid=6351 comm="syz.7.725" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13011 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1850.943012][ T30] audit: type=1400 audit(2000000203.360:1010): avc: denied { bind } for pid=6357 comm="syz.7.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1850.956195][ T30] audit: type=1400 audit(2000000203.370:1011): avc: denied { setopt } for pid=6357 comm="syz.7.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1860.182435][ T6367] xt_hashlimit: size too large, truncated to 1048576 [ 1860.919801][ T30] audit: type=1400 audit(2000000213.300:1012): avc: denied { connect } for pid=6366 comm="syz.7.732" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1866.779472][ T30] audit: type=1400 audit(2000000219.180:1013): avc: denied { write } for pid=6375 comm="syz.6.735" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1868.015004][ T30] audit: type=1400 audit(2000000220.430:1014): avc: denied { read write } for pid=6380 comm="syz.6.737" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1868.033969][ T30] audit: type=1400 audit(2000000220.450:1015): avc: denied { open } for pid=6380 comm="syz.6.737" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1868.097708][ T30] audit: type=1400 audit(2000000220.510:1016): avc: denied { mounton } for pid=6380 comm="syz.6.737" path="/137/file0" dev="tmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1868.283040][ T30] audit: type=1400 audit(2000000220.700:1017): avc: denied { mount } for pid=6380 comm="syz.6.737" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1870.562503][ T30] audit: type=1400 audit(2000000222.970:1018): avc: denied { unmount } for pid=5169 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1871.656064][ T30] audit: type=1400 audit(2000000224.070:1019): avc: denied { create } for pid=6387 comm="syz.6.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1871.720053][ T30] audit: type=1400 audit(2000000224.130:1020): avc: denied { write } for pid=6387 comm="syz.6.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1873.930511][ T6383] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1873.931161][ T6383] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1873.934302][ T6383] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1873.936140][ T6383] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1894.745782][ T30] audit: type=1400 audit(2000000247.130:1021): avc: denied { read write } for pid=6406 comm="syz.6.745" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1894.836774][ T30] audit: type=1400 audit(2000000247.130:1022): avc: denied { open } for pid=6406 comm="syz.6.745" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1894.890476][ T30] audit: type=1400 audit(2000000247.160:1023): avc: denied { ioctl } for pid=6406 comm="syz.6.745" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1913.894065][ T30] audit: type=1400 audit(2000000266.210:1024): avc: denied { create } for pid=6414 comm="syz.7.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1913.895518][ T30] audit: type=1400 audit(2000000266.240:1025): avc: denied { write } for pid=6414 comm="syz.7.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1923.838901][ T30] audit: type=1400 audit(2000000276.240:1026): avc: denied { read write } for pid=6424 comm="syz.7.752" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1923.862324][ T30] audit: type=1400 audit(2000000276.270:1027): avc: denied { open } for pid=6424 comm="syz.7.752" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1923.884135][ T30] audit: type=1400 audit(2000000276.280:1028): avc: denied { ioctl } for pid=6424 comm="syz.7.752" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1923.894655][ T6425] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1923.934530][ T6425] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1929.642103][ T30] audit: type=1400 audit(2000000282.050:1029): avc: denied { setopt } for pid=6433 comm="syz.6.755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1930.594861][ T6439] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1930.721583][ T6439] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1931.980052][ T30] audit: type=1326 audit(2000000284.350:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6442 comm="syz.7.759" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1931.981504][ T30] audit: type=1326 audit(2000000284.380:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6442 comm="syz.7.759" exe="/syz-executor" sig=0 arch=c00000b7 syscall=102 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1932.000838][ T30] audit: type=1326 audit(2000000284.400:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6442 comm="syz.7.759" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1932.002152][ T30] audit: type=1326 audit(2000000284.410:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6442 comm="syz.7.759" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1934.303093][ T6451] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1934.324482][ T6451] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1936.773548][ T6456] binder: 6455 BINDER_GET_NODE_INFO_FOR_REF: only handle may be non-zero. [ 1936.784063][ T6456] binder: 6455:6456 ioctl c018620c 20000040 returned -22 [ 1963.407335][ T30] audit: type=1326 audit(2000000315.820:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6484 comm="syz.7.774" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1963.456770][ T30] audit: type=1326 audit(2000000315.860:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6484 comm="syz.7.774" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1963.460767][ T30] audit: type=1326 audit(2000000315.870:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6484 comm="syz.7.774" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1963.475548][ T30] audit: type=1326 audit(2000000315.890:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6484 comm="syz.7.774" exe="/syz-executor" sig=0 arch=c00000b7 syscall=223 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1963.477096][ T30] audit: type=1326 audit(2000000315.890:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6484 comm="syz.7.774" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1963.594250][ T30] audit: type=1326 audit(2000000315.940:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6484 comm="syz.7.774" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 1968.320932][ T6493] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1968.354039][ T6493] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1969.226263][ T6496] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1969.241236][ T6496] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1971.046252][ T6500] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1980.242322][ T6513] netlink: 40 bytes leftover after parsing attributes in process `syz.6.785'. [ 1980.243905][ T6513] netlink: 40 bytes leftover after parsing attributes in process `syz.6.785'. [ 1980.252737][ T6513] A link change request failed with some changes committed already. Interface ip_vti0 may have been left with an inconsistent configuration, please check. [ 2002.075530][ T30] audit: type=1400 audit(2000000354.490:1040): avc: denied { search } for pid=6544 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2002.091851][ T30] audit: type=1400 audit(2000000354.500:1041): avc: denied { search } for pid=6544 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=530 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2002.110551][ T30] audit: type=1400 audit(2000000354.520:1042): avc: denied { search } for pid=6544 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=678 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2002.142251][ T30] audit: type=1400 audit(2000000354.520:1043): avc: denied { search } for pid=6544 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2002.649843][ T30] audit: type=1400 audit(2000000355.060:1044): avc: denied { read open } for pid=6550 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2002.680458][ T30] audit: type=1400 audit(2000000355.070:1045): avc: denied { getattr } for pid=6550 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2003.800974][ T30] audit: type=1400 audit(2000000356.180:1046): avc: denied { add_name } for pid=6544 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2003.802177][ T30] audit: type=1400 audit(2000000356.210:1047): avc: denied { create } for pid=6544 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2003.824210][ T30] audit: type=1400 audit(2000000356.210:1048): avc: denied { write open } for pid=6544 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=3032 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2003.832254][ T30] audit: type=1400 audit(2000000356.210:1049): avc: denied { append } for pid=6544 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3032 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2011.446523][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 2011.453120][ T30] audit: type=1400 audit(2000000363.860:1054): avc: denied { remove_name } for pid=6564 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3032 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2011.489700][ T30] audit: type=1400 audit(2000000363.860:1055): avc: denied { unlink } for pid=6564 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3032 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2025.615244][ T6650] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2025.643008][ T6650] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2026.439891][ T30] audit: type=1400 audit(2000000378.850:1056): avc: denied { read write } for pid=6651 comm="syz.7.808" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2026.449948][ T30] audit: type=1400 audit(2000000378.860:1057): avc: denied { open } for pid=6651 comm="syz.7.808" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2026.484598][ T30] audit: type=1400 audit(2000000378.900:1058): avc: denied { ioctl } for pid=6651 comm="syz.7.808" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2026.522112][ T6652] input: syz0 as /devices/virtual/input/input4 [ 2026.784680][ T30] audit: type=1400 audit(2000000379.200:1059): avc: denied { create } for pid=6653 comm="syz.6.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2026.823687][ T30] audit: type=1400 audit(2000000379.230:1060): avc: denied { read } for pid=6653 comm="syz.6.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2027.231556][ T30] audit: type=1400 audit(2000000379.650:1061): avc: denied { create } for pid=6655 comm="syz.7.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2027.250683][ T30] audit: type=1400 audit(2000000379.670:1062): avc: denied { setopt } for pid=6655 comm="syz.7.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2038.201452][ T6675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6675 comm=syz.7.816 [ 2043.284004][ T6685] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2043.372589][ T6685] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2043.429263][ T30] audit: type=1400 audit(2000000395.480:1063): avc: denied { write } for pid=6676 comm="syz.7.817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2053.216277][ T6687] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2053.222716][ T6687] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2054.826744][ T6691] netlink: 20 bytes leftover after parsing attributes in process `syz.7.822'. [ 2070.139555][ T30] audit: type=1400 audit(2000000422.550:1064): avc: denied { read write } for pid=5187 comm="syz-executor" name="loop7" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2070.171518][ T30] audit: type=1400 audit(2000000422.580:1065): avc: denied { open } for pid=5187 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2070.180446][ T30] audit: type=1400 audit(2000000422.590:1066): avc: denied { ioctl } for pid=5187 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=644 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2071.400148][ T30] audit: type=1400 audit(2000000423.810:1067): avc: denied { prog_load } for pid=6714 comm="syz.7.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2071.421696][ T30] audit: type=1400 audit(2000000423.830:1068): avc: denied { bpf } for pid=6714 comm="syz.7.833" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2071.441602][ T30] audit: type=1400 audit(2000000423.840:1069): avc: denied { perfmon } for pid=6714 comm="syz.7.833" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2073.260617][ T30] audit: type=1400 audit(2000000425.650:1070): avc: denied { read } for pid=6718 comm="syz.7.834" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2073.325672][ T30] audit: type=1400 audit(2000000425.740:1071): avc: denied { open } for pid=6718 comm="syz.7.834" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2073.495677][ T30] audit: type=1400 audit(2000000425.910:1072): avc: denied { ioctl } for pid=6718 comm="syz.7.834" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2073.547932][ T30] audit: type=1400 audit(2000000425.960:1073): avc: denied { set_context_mgr } for pid=6718 comm="syz.7.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2073.660099][ T6719] binder: 6718:6719 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 2073.661438][ T6719] binder: 6719 RLIMIT_NICE not set [ 2076.881674][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 2076.882663][ T30] audit: type=1400 audit(2000000429.250:1077): avc: denied { execmem } for pid=6724 comm="syz.7.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2080.261377][ T30] audit: type=1400 audit(2000000432.610:1078): avc: denied { name_bind } for pid=6724 comm="syz.7.837" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2080.367594][ T30] audit: type=1400 audit(2000000432.610:1079): avc: denied { node_bind } for pid=6724 comm="syz.7.837" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2097.017230][ T30] audit: type=1400 audit(2000000448.900:1080): avc: denied { create } for pid=6735 comm="syz.7.841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2106.572633][ T30] audit: type=1400 audit(2000000458.980:1081): avc: denied { module_request } for pid=6744 comm="syz.6.844" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2113.533105][ T30] audit: type=1326 audit(2000000465.950:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2113.610291][ T30] audit: type=1326 audit(2000000465.990:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2113.691111][ T30] audit: type=1326 audit(2000000466.090:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2113.752226][ T30] audit: type=1326 audit(2000000466.140:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2113.756962][ T30] audit: type=1326 audit(2000000466.160:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2113.804794][ T30] audit: type=1326 audit(2000000466.210:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=26 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2113.871614][ T30] audit: type=1326 audit(2000000466.280:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2113.908966][ T30] audit: type=1326 audit(2000000466.300:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6753 comm="syz.6.846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2115.921208][ T30] audit: type=1400 audit(2000000468.310:1090): avc: denied { create } for pid=6755 comm="syz.6.847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2116.090383][ T30] audit: type=1400 audit(2000000468.460:1091): avc: denied { write } for pid=6755 comm="syz.6.847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2118.980235][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 2118.981449][ T30] audit: type=1400 audit(2000000471.390:1094): avc: denied { create } for pid=6762 comm="syz.6.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2118.982267][ T30] audit: type=1400 audit(2000000471.390:1095): avc: denied { bind } for pid=6762 comm="syz.6.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2118.992490][ T30] audit: type=1400 audit(2000000471.400:1096): avc: denied { setopt } for pid=6762 comm="syz.6.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2119.000857][ T30] audit: type=1400 audit(2000000471.410:1097): avc: denied { write } for pid=6762 comm="syz.6.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2119.862553][ T30] audit: type=1400 audit(2000000472.270:1098): avc: denied { read } for pid=6762 comm="syz.6.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2121.623881][ T30] audit: type=1326 audit(2000000474.030:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6768 comm="syz.6.852" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2121.630543][ T30] audit: type=1326 audit(2000000474.030:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6768 comm="syz.6.852" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2121.634787][ T30] audit: type=1326 audit(2000000474.050:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6768 comm="syz.6.852" exe="/syz-executor" sig=0 arch=c00000b7 syscall=291 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2121.652710][ T30] audit: type=1326 audit(2000000474.050:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6768 comm="syz.6.852" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2123.634982][ T30] audit: type=1400 audit(2000000476.050:1103): avc: denied { name_bind } for pid=6774 comm="syz.7.855" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2124.347845][ T30] audit: type=1400 audit(2000000476.750:1104): avc: denied { read write } for pid=6770 comm="syz.6.853" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2124.423129][ T30] audit: type=1400 audit(2000000476.750:1105): avc: denied { open } for pid=6770 comm="syz.6.853" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2124.476421][ T30] audit: type=1400 audit(2000000476.890:1106): avc: denied { create } for pid=6770 comm="syz.6.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2124.519616][ T30] audit: type=1400 audit(2000000476.930:1107): avc: denied { mounton } for pid=6770 comm="syz.6.853" path="/194/file0" dev="tmpfs" ino=998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2124.734386][ T30] audit: type=1400 audit(2000000477.120:1108): avc: denied { mount } for pid=6770 comm="syz.6.853" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2126.151480][ T30] audit: type=1400 audit(2000000478.570:1109): avc: denied { create } for pid=6782 comm="syz.7.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2126.167106][ T30] audit: type=1400 audit(2000000478.580:1110): avc: denied { setopt } for pid=6782 comm="syz.7.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2126.692863][ T30] audit: type=1400 audit(2000000479.090:1111): avc: denied { unmount } for pid=5169 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2127.774833][ T30] audit: type=1400 audit(2000000480.180:1112): avc: denied { setopt } for pid=6784 comm="syz.7.860" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2128.342204][ T30] audit: type=1400 audit(2000000480.750:1113): avc: denied { create } for pid=6790 comm="syz.6.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2134.774617][ T30] audit: type=1400 audit(2000000487.190:1114): avc: denied { ioctl } for pid=6800 comm="syz.6.864" path="socket:[14661]" dev="sockfs" ino=14661 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2134.879730][ T30] audit: type=1400 audit(2000000487.280:1115): avc: denied { write } for pid=6800 comm="syz.6.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2137.462246][ T30] audit: type=1326 audit(2000000489.860:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2137.463728][ T30] audit: type=1326 audit(2000000489.870:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2137.464764][ T30] audit: type=1326 audit(2000000489.870:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2137.492715][ T30] audit: type=1326 audit(2000000489.910:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2137.515310][ T30] audit: type=1326 audit(2000000489.930:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2137.521823][ T30] audit: type=1326 audit(2000000489.930:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2137.542648][ T30] audit: type=1326 audit(2000000489.960:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2137.563616][ T30] audit: type=1326 audit(2000000489.980:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6805 comm="syz.6.866" exe="/syz-executor" sig=0 arch=c00000b7 syscall=130 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2151.632054][ T6812] mmap: syz.6.868 (6812) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2152.214319][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 2152.216786][ T30] audit: type=1400 audit(2000000504.630:1126): avc: denied { create } for pid=6814 comm="syz.6.869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2152.259962][ T30] audit: type=1400 audit(2000000504.670:1127): avc: denied { connect } for pid=6814 comm="syz.6.869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2154.057544][ T30] audit: type=1400 audit(2000000506.470:1128): avc: denied { read } for pid=6818 comm="syz.6.871" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2154.074654][ T30] audit: type=1400 audit(2000000506.490:1129): avc: denied { open } for pid=6818 comm="syz.6.871" path="net:[4026532626]" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2159.804499][ T6821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2160.170915][ T6821] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2160.172191][ T6821] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2160.205481][ T6821] veth1_vlan: left promiscuous mode [ 2160.219080][ T6821] veth0_vlan: left promiscuous mode [ 2160.225800][ T6821] veth0_vlan: entered promiscuous mode [ 2160.257811][ T6821] veth1_vlan: entered promiscuous mode [ 2160.303925][ T6821] veth1_macvtap: left promiscuous mode [ 2160.314995][ T6821] veth0_macvtap: left promiscuous mode [ 2160.325849][ T6821] veth0_macvtap: entered promiscuous mode [ 2160.335983][ T6821] veth1_macvtap: entered promiscuous mode [ 2160.351396][ T6821] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2160.352260][ T6821] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2160.352749][ T6821] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2160.353231][ T6821] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2163.803293][ T6592] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2163.825563][ T6592] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2163.852831][ T5986] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2163.903250][ T5986] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2165.204857][ T3447] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2167.899674][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2171.852540][ T30] audit: type=1400 audit(2000000524.070:1130): avc: denied { create } for pid=6825 comm="syz.6.873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 2171.856619][ T30] audit: type=1400 audit(2000000524.170:1131): avc: denied { sys_admin } for pid=6825 comm="syz.6.873" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 2171.935960][ T30] audit: type=1400 audit(2000000524.200:1132): avc: denied { checkpoint_restore } for pid=6825 comm="syz.6.873" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2175.820499][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2176.653668][ T30] audit: type=1400 audit(2000000529.060:1133): avc: denied { write } for pid=6836 comm="syz.7.876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2179.253686][ T30] audit: type=1326 audit(2000000531.670:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6838 comm="syz.7.877" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2179.268996][ T30] audit: type=1326 audit(2000000531.680:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6838 comm="syz.7.877" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2179.275933][ T30] audit: type=1326 audit(2000000531.690:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6838 comm="syz.7.877" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2179.291021][ T30] audit: type=1326 audit(2000000531.710:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6838 comm="syz.7.877" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2179.296996][ T30] audit: type=1326 audit(2000000531.710:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6838 comm="syz.7.877" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2179.307390][ T30] audit: type=1326 audit(2000000531.720:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6838 comm="syz.7.877" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2179.327646][ T30] audit: type=1326 audit(2000000531.740:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6838 comm="syz.7.877" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2189.196150][ T30] audit: type=1400 audit(2000000797.599:1141): avc: denied { audit_write } for pid=6851 comm="syz.7.884" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2191.811703][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2201.141919][ T30] audit: type=1400 audit(2000000809.549:1142): avc: denied { read write } for pid=6865 comm="syz.7.887" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2201.175362][ T30] audit: type=1400 audit(2000000809.569:1143): avc: denied { open } for pid=6865 comm="syz.7.887" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2201.179773][ T30] audit: type=1400 audit(2000000809.589:1144): avc: denied { ioctl } for pid=6865 comm="syz.7.887" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2202.036608][ T6866] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2202.117674][ T6866] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2203.815140][ T30] audit: type=1326 audit(2000000812.229:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6867 comm="syz.7.888" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2203.841341][ T30] audit: type=1326 audit(2000000812.259:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6867 comm="syz.7.888" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2204.004930][ T30] audit: type=1326 audit(2000000812.399:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6867 comm="syz.7.888" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2204.072019][ T30] audit: type=1326 audit(2000000812.479:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6867 comm="syz.7.888" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2204.130981][ T30] audit: type=1326 audit(2000000812.529:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6867 comm="syz.7.888" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2204.131577][ T30] audit: type=1326 audit(2000000812.539:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6867 comm="syz.7.888" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2204.160996][ T30] audit: type=1326 audit(2000000812.569:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6867 comm="syz.7.888" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2213.220997][ T6878] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2213.304545][ T6878] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2221.251585][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 2221.252735][ T30] audit: type=1400 audit(2000000829.659:1171): avc: denied { read } for pid=6890 comm="syz.7.898" path="socket:[15371]" dev="sockfs" ino=15371 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2221.831355][ T30] audit: type=1326 audit(2000000830.229:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6894 comm="syz.6.899" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2221.844140][ T30] audit: type=1326 audit(2000000830.259:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6894 comm="syz.6.899" exe="/syz-executor" sig=0 arch=c00000b7 syscall=143 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2221.845394][ T30] audit: type=1326 audit(2000000830.259:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6894 comm="syz.6.899" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2221.857639][ T30] audit: type=1326 audit(2000000830.259:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6894 comm="syz.6.899" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2223.171412][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2223.901895][ T30] audit: type=1400 audit(2000000832.319:1176): avc: denied { create } for pid=6898 comm="syz.6.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2223.971461][ T30] audit: type=1400 audit(2000000832.379:1177): avc: denied { write } for pid=6898 comm="syz.6.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2225.522713][ T30] audit: type=1400 audit(2000000833.929:1178): avc: denied { connect } for pid=6903 comm="syz.6.903" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2225.761091][ T30] audit: type=1326 audit(2000000834.149:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8655268c code=0x7ffc0000 [ 2225.766780][ T30] audit: type=1326 audit(2000000834.179:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff87451804 code=0x7ffc0000 [ 2226.263538][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 2226.265392][ T30] audit: type=1326 audit(2000000834.659:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff87451804 code=0x7ffc0000 [ 2226.286944][ T30] audit: type=1326 audit(2000000834.699:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8655268c code=0x7ffc0000 [ 2226.352520][ T30] audit: type=1326 audit(2000000834.699:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff87451804 code=0x7ffc0000 [ 2226.356754][ T30] audit: type=1326 audit(2000000834.769:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8655268c code=0x7ffc0000 [ 2226.393178][ T30] audit: type=1326 audit(2000000834.769:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff87451804 code=0x7ffc0000 [ 2226.422901][ T30] audit: type=1326 audit(2000000834.839:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8655268c code=0x7ffc0000 [ 2226.426256][ T30] audit: type=1326 audit(2000000834.839:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff87451804 code=0x7ffc0000 [ 2226.430925][ T30] audit: type=1326 audit(2000000834.839:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8655268c code=0x7ffc0000 [ 2226.504907][ T30] audit: type=1326 audit(2000000834.919:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff87451804 code=0x7ffc0000 [ 2226.509291][ T30] audit: type=1326 audit(2000000834.919:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.7.904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8655268c code=0x7ffc0000 [ 2234.602301][ T30] kauditd_printk_skb: 173 callbacks suppressed [ 2234.607269][ T30] audit: type=1326 audit(2000000843.019:1413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6917 comm="syz.7.909" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2234.622707][ T30] audit: type=1326 audit(2000000843.039:1414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6917 comm="syz.7.909" exe="/syz-executor" sig=0 arch=c00000b7 syscall=44 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2234.626663][ T30] audit: type=1326 audit(2000000843.039:1415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6917 comm="syz.7.909" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2235.554368][ T30] audit: type=1400 audit(2000000843.969:1416): avc: denied { allowed } for pid=6919 comm="syz.7.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2235.572141][ T30] audit: type=1400 audit(2000000843.979:1417): avc: denied { create } for pid=6919 comm="syz.7.910" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2235.636164][ T30] audit: type=1400 audit(2000000843.999:1418): avc: denied { map } for pid=6919 comm="syz.7.910" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14853 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2235.643504][ T30] audit: type=1400 audit(2000000844.049:1419): avc: denied { read write } for pid=6919 comm="syz.7.910" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14853 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2241.237536][ T30] audit: type=1400 audit(2000000849.639:1420): avc: denied { read } for pid=6927 comm="syz.6.913" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2241.243406][ T30] audit: type=1400 audit(2000000849.659:1421): avc: denied { open } for pid=6927 comm="syz.6.913" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2241.320534][ T30] audit: type=1400 audit(2000000849.729:1422): avc: denied { ioctl } for pid=6927 comm="syz.6.913" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2242.054522][ T6932] netlink: 'syz.6.915': attribute type 12 has an invalid length. [ 2242.101002][ T30] audit: type=1400 audit(2000000850.519:1423): avc: denied { write } for pid=6931 comm="syz.6.915" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2254.707692][ T30] audit: type=1400 audit(2000000863.119:1424): avc: denied { mounton } for pid=6942 comm="syz.6.919" path="/224/file0" dev="tmpfs" ino=1150 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2257.814233][ T6949] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2257.843054][ T6949] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2260.344606][ T6951] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6951 comm=syz.6.921 [ 2269.405824][ T30] audit: type=1400 audit(2000000877.819:1425): avc: denied { write } for pid=6954 comm="syz.6.922" name="route" dev="proc" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2273.967073][ T30] audit: type=1400 audit(2000000882.379:1426): avc: denied { sys_module } for pid=6962 comm="syz.7.925" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2275.837926][ T6968] binder: 6968 RLIMIT_NICE not set [ 2287.169649][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2305.041870][ T30] audit: type=1400 audit(2000000913.099:1427): avc: denied { name_bind } for pid=6983 comm="syz.7.931" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2316.510659][ T30] audit: type=1400 audit(2000000924.919:1428): avc: denied { read } for pid=6995 comm="syz.7.935" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2316.512847][ T30] audit: type=1400 audit(2000000924.919:1429): avc: denied { open } for pid=6995 comm="syz.7.935" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2316.606749][ T30] audit: type=1400 audit(2000000925.019:1430): avc: denied { ioctl } for pid=6995 comm="syz.7.935" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2318.121403][ T30] audit: type=1400 audit(2000000926.539:1431): avc: denied { sqpoll } for pid=7004 comm="syz.7.938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2318.953612][ T7009] fuse: Bad value for 'fd' [ 2329.905184][ T30] audit: type=1400 audit(2000000938.039:1432): avc: denied { bind } for pid=7050 comm="syz.7.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2329.906506][ T30] audit: type=1400 audit(2000000938.089:1433): avc: denied { setopt } for pid=7050 comm="syz.7.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2341.757326][ T7070] fuse: Bad value for 'fd' [ 2344.259672][ T30] audit: type=1400 audit(2000000952.639:1434): avc: denied { bind } for pid=7076 comm="syz.7.949" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2344.316828][ T30] audit: type=1400 audit(2000000952.729:1435): avc: denied { map } for pid=7076 comm="syz.7.949" path="socket:[15515]" dev="sockfs" ino=15515 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 2351.620221][ T30] audit: type=1400 audit(2000000959.449:1436): avc: denied { bind } for pid=7077 comm="syz.6.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2351.620950][ T30] audit: type=1400 audit(2000000959.469:1437): avc: denied { listen } for pid=7077 comm="syz.6.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2352.569442][ T30] audit: type=1400 audit(2000000960.489:1438): avc: denied { accept } for pid=7077 comm="syz.6.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2360.922280][ T7093] fuse: Bad value for 'fd' [ 2365.930464][ T30] audit: type=1400 audit(2000000974.339:1439): avc: denied { load_policy } for pid=7102 comm="syz.6.957" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2366.047050][ T7103] SELinux: failed to load policy [ 2368.831047][ T7113] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2368.877805][ T7113] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2371.406395][ T7115] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2371.471520][ T7115] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2375.875532][ T30] audit: type=1400 audit(2000000984.289:1440): avc: denied { create } for pid=7118 comm="syz.6.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2376.150109][ T30] audit: type=1400 audit(2000000984.559:1441): avc: denied { ioctl } for pid=7118 comm="syz.6.964" path="socket:[15137]" dev="sockfs" ino=15137 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2383.894847][ T30] audit: type=1326 audit(2000000992.309:1442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.7.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2383.896108][ T30] audit: type=1326 audit(2000000992.309:1443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.7.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2383.969701][ T30] audit: type=1326 audit(2000000992.379:1444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.7.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2388.141383][ T7134] netem: change failed [ 2388.739908][ T7134] netlink: 68 bytes leftover after parsing attributes in process `syz.6.970'. [ 2388.893858][ T30] audit: type=1400 audit(2000000997.109:1445): avc: denied { execute } for pid=7130 comm="syz.6.970" dev="tmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2389.016607][ T30] audit: type=1400 audit(2000000997.129:1446): avc: denied { execute_no_trans } for pid=7130 comm="syz.6.970" path=2F6D656D66643A5B0BDB58AE5B35A990FF631F1AA9FDFAADD16D64E7E27F9BD55210F3B6FF54BFD1C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2402.243444][ T30] audit: type=1326 audit(2000001010.659:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7142 comm="syz.7.974" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2402.247111][ T30] audit: type=1326 audit(2000001010.659:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7142 comm="syz.7.974" exe="/syz-executor" sig=0 arch=c00000b7 syscall=240 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2402.293337][ T30] audit: type=1326 audit(2000001010.709:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7142 comm="syz.7.974" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2404.452200][ T30] audit: type=1400 audit(2000001012.859:1450): avc: denied { block_suspend } for pid=7144 comm="syz.7.975" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2411.940500][ T30] audit: type=1400 audit(2000001019.389:1451): avc: denied { write } for pid=7148 comm="syz.7.976" path="socket:[15622]" dev="sockfs" ino=15622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2420.302816][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2430.801919][ T30] audit: type=1400 audit(2000001038.919:1452): avc: denied { ioctl } for pid=7165 comm="syz.7.982" path="socket:[15230]" dev="sockfs" ino=15230 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2460.502426][ T30] audit: type=1400 audit(2000001068.919:1453): avc: denied { setopt } for pid=7207 comm="syz.6.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2465.680142][ T30] audit: type=1107 audit(2000001074.089:1454): pid=7212 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='ŸØ' [ 2470.527793][ T30] audit: type=1326 audit(2000001078.939:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7216 comm="syz.6.998" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2470.532093][ T30] audit: type=1326 audit(2000001078.949:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7216 comm="syz.6.998" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2470.585088][ T30] audit: type=1326 audit(2000001078.999:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7216 comm="syz.6.998" exe="/syz-executor" sig=0 arch=c00000b7 syscall=0 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2471.106748][ T30] audit: type=1326 audit(2000001079.519:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7216 comm="syz.6.998" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2471.108856][ T30] audit: type=1326 audit(2000001079.519:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7216 comm="syz.6.998" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2471.429435][ T30] audit: type=1326 audit(2000001079.839:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7221 comm="syz.7.1000" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2471.430145][ T30] audit: type=1326 audit(2000001079.839:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7221 comm="syz.7.1000" exe="/syz-executor" sig=0 arch=c00000b7 syscall=176 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2471.430751][ T30] audit: type=1326 audit(2000001079.839:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7221 comm="syz.7.1000" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8655aba8 code=0x7ffc0000 [ 2472.752573][ T30] audit: type=1326 audit(2000001081.079:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7224 comm="syz.6.1001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2472.790225][ T30] audit: type=1326 audit(2000001081.169:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7224 comm="syz.6.1001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2472.860113][ T30] audit: type=1326 audit(2000001081.269:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7224 comm="syz.6.1001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=134 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2472.878960][ T30] audit: type=1326 audit(2000001081.279:1466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7224 comm="syz.6.1001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2472.921839][ T30] audit: type=1326 audit(2000001081.329:1467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7224 comm="syz.6.1001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f75aba8 code=0x7ffc0000 [ 2476.852401][ T7232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2478.641961][ T7232] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2478.643198][ T7232] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2478.673189][ T7232] veth1_vlan: left promiscuous mode [ 2478.683753][ T7232] veth0_vlan: left promiscuous mode [ 2478.691638][ T7232] veth0_vlan: entered promiscuous mode [ 2478.715584][ T7232] veth1_vlan: entered promiscuous mode [ 2478.752765][ T7232] veth1_macvtap: left promiscuous mode [ 2478.762587][ T7232] veth0_macvtap: left promiscuous mode [ 2478.773186][ T7232] veth0_macvtap: entered promiscuous mode [ 2478.783366][ T7232] veth1_macvtap: entered promiscuous mode [ 2478.797337][ T7232] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2478.799557][ T7232] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2478.800088][ T7232] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2478.800598][ T7232] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2490.596440][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 2490.676059][ T30] audit: type=1400 audit(2000001098.989:1474): avc: denied { getopt } for pid=7241 comm="syz.7.1009" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2524.110128][ T30] audit: type=1400 audit(2000001132.519:1475): avc: denied { name_bind } for pid=7253 comm="syz.6.1012" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2524.132359][ T30] audit: type=1400 audit(2000001132.539:1476): avc: denied { node_bind } for pid=7253 comm="syz.6.1012" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 2537.700563][ T7270] netem: change failed [ 2538.357052][ T7271] netlink: 68 bytes leftover after parsing attributes in process `syz.6.1017'. [ 2550.244670][ T30] audit: type=1400 audit(2000001158.659:1477): avc: denied { connect } for pid=7279 comm="syz.7.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2550.268682][ T30] audit: type=1400 audit(2000001158.679:1478): avc: denied { write } for pid=7279 comm="syz.7.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2565.974115][ T7292] syzkaller0: entered promiscuous mode [ 2565.975140][ T7292] syzkaller0: entered allmulticast mode [ 2588.539105][ T30] audit: type=1400 audit(2000001196.939:1479): avc: denied { search } for pid=7314 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2588.540051][ T30] audit: type=1400 audit(2000001196.939:1480): avc: denied { search } for pid=7314 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=530 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2588.540648][ T30] audit: type=1400 audit(2000001196.939:1481): avc: denied { search } for pid=7314 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=678 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2588.541022][ T30] audit: type=1400 audit(2000001196.939:1482): avc: denied { search } for pid=7314 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2588.792482][ T30] audit: type=1400 audit(2000001197.199:1483): avc: denied { read open } for pid=7319 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2588.811881][ T30] audit: type=1400 audit(2000001197.199:1484): avc: denied { getattr } for pid=7319 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2589.429653][ T30] audit: type=1400 audit(2000001197.829:1485): avc: denied { add_name } for pid=7314 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2589.430401][ T30] audit: type=1400 audit(2000001197.829:1486): avc: denied { create } for pid=7314 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2589.445767][ T30] audit: type=1400 audit(2000001197.859:1487): avc: denied { write open } for pid=7314 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=3666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2589.474405][ T30] audit: type=1400 audit(2000001197.889:1488): avc: denied { append } for pid=7314 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2613.532855][ T7324] syzkaller0: entered promiscuous mode [ 2613.533594][ T7324] syzkaller0: entered allmulticast mode [ 2613.600396][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 2613.601103][ T30] audit: type=1400 audit(2000001222.009:1493): avc: denied { relabelfrom } for pid=7323 comm="syz.6.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2613.601590][ T30] audit: type=1400 audit(2000001222.009:1494): avc: denied { relabelto } for pid=7323 comm="syz.6.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2635.243577][ T30] audit: type=1400 audit(2000001243.659:1495): avc: denied { execute } for pid=7350 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2635.291403][ T30] audit: type=1400 audit(2000001243.689:1496): avc: denied { execute_no_trans } for pid=7350 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2635.846782][ T30] audit: type=1400 audit(2000001244.259:1497): avc: denied { mounton } for pid=7351 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2651.736555][ T7373] block nbd7: not configured, cannot reconfigure [ 2656.266648][ T7389] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2656.283172][ T7389] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2656.922850][ T30] audit: type=1400 audit(2000001265.339:1498): avc: denied { create } for pid=7390 comm="syz.7.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2660.564920][ T7351] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2660.615369][ T7351] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2665.009239][ T30] audit: type=1400 audit(2000001273.419:1499): avc: denied { create } for pid=7418 comm="syz.7.1058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2665.023701][ T30] audit: type=1400 audit(2000001273.439:1500): avc: denied { setopt } for pid=7418 comm="syz.7.1058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2667.456941][ T7351] hsr_slave_0: entered promiscuous mode [ 2667.483933][ T7351] hsr_slave_1: entered promiscuous mode [ 2667.540550][ T7351] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2667.541212][ T7351] Cannot create hsr debugfs directory [ 2669.774438][ T7351] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 2669.816236][ T7351] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 2669.875679][ T7351] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 2669.936215][ T7351] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 2675.587242][ T7351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2676.961119][ T30] audit: type=1400 audit(2000001285.369:1501): avc: denied { ioctl } for pid=7450 comm="syz.7.1064" path="socket:[16912]" dev="sockfs" ino=16912 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2681.420054][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2693.531538][ T30] audit: type=1400 audit(2000001301.929:1502): avc: denied { bind } for pid=7489 comm="syz.7.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2694.510032][ T30] audit: type=1400 audit(2000001302.919:1503): avc: denied { create } for pid=7492 comm="syz.7.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2694.561793][ T30] audit: type=1400 audit(2000001302.979:1504): avc: denied { write } for pid=7492 comm="syz.7.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2695.063259][ T7497] vcan0: tx drop: invalid da for name 0x0000000000000003 [ 2698.793161][ T30] audit: type=1400 audit(2000001307.189:1505): avc: denied { create } for pid=7508 comm="syz.7.1077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2698.793965][ T30] audit: type=1400 audit(2000001307.199:1506): avc: denied { setopt } for pid=7508 comm="syz.7.1077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2713.994505][ T7526] fuse: Unknown parameter 'group_i00000000000000000000' [ 2717.866753][ T7351] veth0_vlan: entered promiscuous mode [ 2718.103732][ T7351] veth1_vlan: entered promiscuous mode [ 2719.500813][ T7351] veth0_macvtap: entered promiscuous mode [ 2719.930802][ T7351] veth1_macvtap: entered promiscuous mode [ 2725.046149][ T7351] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2725.047595][ T7351] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2725.070956][ T7351] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2725.071917][ T7351] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2726.591943][ T30] audit: type=1400 audit(2000001335.009:1507): avc: denied { mounton } for pid=7351 comm="syz-executor" path="/syzkaller.0HZ0Bo/syz-tmp" dev="vda" ino=1884 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2726.623993][ T30] audit: type=1400 audit(2000001335.039:1508): avc: denied { mount } for pid=7351 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2726.665743][ T30] audit: type=1400 audit(2000001335.079:1509): avc: denied { mount } for pid=7351 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2726.700753][ T30] audit: type=1400 audit(2000001335.119:1510): avc: denied { mounton } for pid=7351 comm="syz-executor" path="/syzkaller.0HZ0Bo/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2726.740299][ T30] audit: type=1400 audit(2000001335.139:1511): avc: denied { mounton } for pid=7351 comm="syz-executor" path="/syzkaller.0HZ0Bo/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=17062 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2726.839577][ T30] audit: type=1400 audit(2000001335.239:1512): avc: denied { unmount } for pid=7351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2726.930823][ T30] audit: type=1400 audit(2000001335.329:1513): avc: denied { mounton } for pid=7351 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2726.932174][ T30] audit: type=1400 audit(2000001335.329:1514): avc: denied { mount } for pid=7351 comm="syz-executor" name="/" dev="gadgetfs" ino=10587 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 2727.025217][ T30] audit: type=1400 audit(2000001335.439:1515): avc: denied { mount } for pid=7351 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2727.040355][ T30] audit: type=1400 audit(2000001335.449:1516): avc: denied { mounton } for pid=7351 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2731.010391][ T7550] fuse: Unknown parameter 'group_i00000000000000000000' [ 2733.211572][ T7556] netlink: 56 bytes leftover after parsing attributes in process `syz.8.1086'. [ 2737.212857][ T7563] fuse: Unknown parameter 'group_id00000000000000000000' [ 2753.625199][ T7592] fuse: Bad value for 'user_id' [ 2753.625957][ T7592] fuse: Bad value for 'user_id' [ 2753.664569][ T30] audit: type=1400 audit(2000001362.079:1517): avc: denied { create } for pid=7590 comm="syz.8.1101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2755.643050][ T7603] fuse: Bad value for 'user_id' [ 2755.653693][ T7603] fuse: Bad value for 'user_id' [ 2758.805062][ T7613] fuse: Bad value for 'user_id' [ 2758.806333][ T7613] fuse: Bad value for 'user_id' [ 2765.364121][ T7637] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1121'. [ 2769.130748][ T30] audit: type=1400 audit(2000001377.529:1518): avc: denied { accept } for pid=7648 comm="syz.8.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2771.625292][ T30] audit: type=1400 audit(2000001380.039:1519): avc: denied { bind } for pid=7660 comm="syz.8.1133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2775.772491][ T7682] netlink: 96 bytes leftover after parsing attributes in process `syz.7.1140'. [ 2775.774169][ T7682] netlink: 40 bytes leftover after parsing attributes in process `syz.7.1140'. [ 2780.805118][ T30] audit: type=1400 audit(2000001389.219:1520): avc: denied { bind } for pid=7704 comm="syz.7.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2781.453901][ T30] audit: type=1400 audit(2000001389.869:1521): avc: denied { setopt } for pid=7704 comm="syz.7.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2787.881654][ T7720] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1155'. [ 2794.172242][ T7735] fuse: Bad value for 'fd' [ 2797.406661][ T7742] netlink: 12 bytes leftover after parsing attributes in process `syz.8.1163'. [ 2797.422542][ T7742] netlink: 20 bytes leftover after parsing attributes in process `syz.8.1163'. [ 2798.417529][ T7745] [ 2798.419122][ T7745] ============================= [ 2798.419529][ T7745] WARNING: suspicious RCU usage [ 2798.421577][ T7745] 6.16.0-rc5-syzkaller-00121-gbc9ff192a6c9 #0 Not tainted [ 2798.422196][ T7745] ----------------------------- [ 2798.423565][ T7745] net/core/netclassid_cgroup.c:23 suspicious rcu_dereference_check() usage! [ 2798.424472][ T7745] [ 2798.424472][ T7745] other info that might help us debug this: [ 2798.424472][ T7745] [ 2798.424944][ T7745] [ 2798.424944][ T7745] rcu_scheduler_active = 2, debug_locks = 1 [ 2798.425410][ T7745] 1 lock held by syz.8.1164/7745: [ 2798.425765][ T7745] #0: ffff8000872c0ea0 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x224/0x7f0 [ 2798.427274][ T7745] [ 2798.427274][ T7745] stack backtrace: [ 2798.428078][ T7745] CPU: 0 UID: 0 PID: 7745 Comm: syz.8.1164 Not tainted 6.16.0-rc5-syzkaller-00121-gbc9ff192a6c9 #0 PREEMPT [ 2798.428540][ T7745] Hardware name: linux,dummy-virt (DT) [ 2798.429224][ T7745] Call trace: [ 2798.429603][ T7745] show_stack+0x18/0x24 (C) [ 2798.429970][ T7745] dump_stack_lvl+0xdc/0xf4 [ 2798.430238][ T7745] dump_stack+0x1c/0x28 [ 2798.430440][ T7745] lockdep_rcu_suspicious+0x174/0x2a8 [ 2798.430737][ T7745] task_cls_state+0x108/0x124 [ 2798.430989][ T7745] bpf_get_cgroup_classid_curr+0x18/0x5c [ 2798.431215][ T7745] bpf_prog_841aec7193f618b3+0x30/0x50 [ 2798.431988][ T7745] bpf_prog_test_run_syscall+0x4ac/0x7f0 [ 2798.432296][ T7745] __sys_bpf+0xd78/0x25ac [ 2798.432596][ T7745] __arm64_sys_bpf+0x70/0xa4 [ 2798.432887][ T7745] invoke_syscall+0x6c/0x258 [ 2798.433232][ T7745] el0_svc_common.constprop.0+0xac/0x230 [ 2798.433571][ T7745] do_el0_svc+0x40/0x58 [ 2798.433871][ T7745] el0_svc+0x50/0x198 [ 2798.434141][ T7745] el0t_64_sync_handler+0x10c/0x138 [ 2798.434505][ T7745] el0t_64_sync+0x198/0x19c [ 2798.500013][ T30] audit: type=1400 audit(2000001406.899:1522): avc: denied { write } for pid=3297 comm="syz-executor" path="pipe:[3235]" dev="pipefs" ino=3235 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2802.090540][ T6605] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2802.576127][ T6605] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2803.231124][ T6605] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2803.817242][ T6605] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2806.321973][ T30] audit: type=1400 audit(2000001414.729:1523): avc: denied { read } for pid=3147 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 2810.676766][ T6605] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2811.003625][ T6605] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2811.201909][ T6605] bond0 (unregistering): Released all slaves [ 2811.782323][ T6605] hsr_slave_0: left promiscuous mode [ 2811.797901][ T6605] hsr_slave_1: left promiscuous mode [ 2811.939642][ T6605] veth1_macvtap: left promiscuous mode [ 2811.941120][ T6605] veth0_macvtap: left promiscuous mode [ 2811.942965][ T6605] veth1_vlan: left promiscuous mode [ 2811.947223][ T6605] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 15:57:14 Registers: info registers vcpu 0 CPU#0 PC=ffff800080012104 X00=00000000000000c0 X01=ffff80008705a158 X02=0000000000000001 X03=1fffe00002671791 X04=0000000000000002 X05=ffff80008df07628 X06=ffff80008df07640 X07=ffff80008df076f0 X08=ffff80008df075c8 X09=dfff800000000000 X10=ffff700011be0eb8 X11=1ffff00011be0eb8 X12=ffff700011be0eb9 X13=0000000000008000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff800087ae0400 X20=dfff800000000000 X21=ffff8000871d0b40 X22=ffff700010e3a168 X23=0000000000000000 X24=ffff800087ae04a8 X25=1ffff00010f5c095 X26=0000000000000000 X27=ffff80008df07780 X28=0000000000000000 X29=ffff80008df076e0 X30=ffff80008034abe8 SP=ffff80008df076e0 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffc6e381e0:3b061fe5e4e09600 Q02=0000ffffc6e381c0:ffffff80ffffffd8 Q03=0000ffffc6e38270:0000ffffc6e38270 Q04=0000ffffc6e38270:0000ffff89736c88 Q05=0000ffffc6e38240:0000ffffc6e38270 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc6e38490:0000ffffc6e38490 Q17=ffffff80ffffffd0:0000ffffc6e38460 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008540d274 X00=ffff00001551bc88 X01=0000000000000003 X02=0000000000000000 X03=dfff800000000000 X04=ffff70001424aefa X05=ffff8000a12577a8 X06=ffff8000a12577c0 X07=ffff8000a1257870 X08=ffff8000a1257748 X09=dfff800000000000 X10=ffff70001424aee8 X11=1ffff0001424aee8 X12=ffff70001424aee9 X13=0000000000000000 X14=ffff00006a0b83b0 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff80008706dd40 X20=ffff7fffe305e000 X21=ffff8000864236c0 X22=ffff600002f72231 X23=1fffe00002f721c1 X24=ffff000017b90e80 X25=ffff0000253ff058 X26=1fffe00004a7fe0b X27=1fffe00004a7fe00 X28=0000000000000000 X29=ffff8000a1257880 X30=ffff800084b36424 SP=ffff8000a1257820 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000010000000000:00260000000cffff Q03=0000000000110000:000cffffffd60000 Q04=0000000000110000:000cffffffd60000 Q05=000e0000000cffff:ffea000000000300 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=deec654f328289be:bfa8fea4b83c5916 Q19=3e517e7ff8eb85fc:ec636aa5353bd863 Q20=9c47211fbd23d74b:f2630e20378351ae Q21=b5291db9e6077a54:649e8f97935d6275 Q22=c8da3a09dbe4ae32:a31dfce7b93e70e6 Q23=1bb701a8d08bb74c:e4fdf87c81750174 Q24=2f6821b502a98fdf:12aac9c50a780384 Q25=e828059d1e69e185:63e73237411b8c50 Q26=dee46540329289b4:bfa8fea4b83c5a16 Q27=3e517e7ff8ec85fc:ec6f6aa53531d867 Q28=03f1b3b2526c691b:9ba666cf1cf478e9 Q29=c546d22c813ebe4e:09cb0888fb3ac3f7 Q30=8833b1494877ac57:bd6f370aa5de2388 Q31=cf6b839bc7d04b8f:dd5fcb4aae803369